• 🔥 Большое обновление PirateHUB Private!

    PirateHUB Private - закрытое сообщество PirateHUB, внутри которого:
    150+ приваток авторов по различным направлениям, 15+ совместных доступов, несколько сотен курсов в день от зарубежных авторов напрямую и многое другое. Нас уже почти 1000 человек!


    Что внутри + отзывы довольных участников:

    Ознакомиться

    *Анонсированы крупные обновления, не пропустите!

    ❗️Вход по старой цене открыт до 7 ноября включительно! Каждый участник получает бесплатный доступ к Web-Master Club от PirateHUB Academy и дополнительные бонусы!

Development [Pluralsight] Ethical Hacking: Reconnaissance/Footprinting

657xNxproxy.php,qimage=https,P3A,P2F,P2Fwww.freecoursesonline.me,P2Fwp-content,P2Fuploads,P2F2017,P2F10,P2Fgeneric1-1024x577.jpg,ahash=11aa6f90bf524e1d1b8203d2627b4c38.pagespeed.ic.qRLKn6isiX.webp

DESCRIPTION:

Pluralsight is not an official partner or accredited training center of EC-Council. This course covers the process of probing a system with the intent of compromising the target. The goal is to gather as much data as possible about a would-be target.

Pluralsight is not an official partner or accredited training center of EC-Council. As an Ethical Hacker, you've been asked to do a "Blackbox" attack on a customer's infrastructure. Your first step is finding out as much as you can about the "target." You accomplish this via reconnaissance/footprinting. This is the initial stage in gaining a blueprint of the security profile of a target, and it is accomplished in an organized manner. Reconnaissance is one of the three "pre-attack phases," and results in a unique profile of an organization's networks and systems. "Reconning" an organization is necessary in order to systematically gather all the related data in regards to the technologies deployed within the network. Reconnaissance can take up to 90% of the time during penetration testing or an actual attack. We'll show you how attackers are currently reconning your company, as well as discuss in detail the steps of reconnaissance. Finally we'll look at some possible countermeasures to help discourage attackers. This course is part of the Ethical Hacking Series. Ethical Hacking (CEH Prep 2018)

About the author
Dale Meredith has been a Certified Ethical Hacker/Instructor EC-Council for the past 15 years, and Microsoft Certified Trainer for over 20 years. Dale also has an additional 7 years of senior IT management experience and worked as a CTO for a popular ISP provider. Dale's expertise is in explaining difficult concepts and ensuring his students have an actionable knowledge of the course material.

SALES PAGE:
DOWNLOAD:
 

Назад
Сверху