This course is all about introducing the learner to the 01 Information Gathering section of Kali . You'll learn about about a few of the tools available on the Kali platform and how they can be used to gather key information on your target.
This course is all about introducing the learner to the 01 Information Gathering section of Kali . You'll learn about about a few of the tools available on the Kali platform and how they can be used to gather key information on your target.
Whether you work on the blue team within your company or are hired as a red teamer to help harden a company’s defense, knowing what vulnerabilities you are broadcasting to the world is important. In this course, Information Gathering with Kali Linux, you’ll learn to run the information gathering set of tools to conduct the reconnaissance step in the cyber kill chain. First, you will explore tools for conducting DNS Analysis and host identification. Then, you'll learn about network discovery and OSINT analysis. Finally, you will go through how to use that information to conduct a social engineering attack. When you’re finished with this course, you will have the skills and knowledge to conduct proper information gathering of assets and resources openly broadcasted to the world needed to lockdown, harden, and secure your company in today’s cyber world.
OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.
Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.
Find this site helpful? Tell a friend about us.
We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.
Your purchases help us maintain our catalog and keep our servers humming without ads.
Thank you for supporting OpenCourser.