We may earn an affiliate commission when you visit our partners.
Mike Woolard

This course is all about introducing the learner to the 01 Information Gathering section of Kali . You'll learn about about a few of the tools available on the Kali platform and how they can be used to gather key information on your target.

Read more

This course is all about introducing the learner to the 01 Information Gathering section of Kali . You'll learn about about a few of the tools available on the Kali platform and how they can be used to gather key information on your target.

Whether you work on the blue team within your company or are hired as a red teamer to help harden a company’s defense, knowing what vulnerabilities you are broadcasting to the world is important. In this course, Information Gathering with Kali Linux, you’ll learn to run the information gathering set of tools to conduct the reconnaissance step in the cyber kill chain. First, you will explore tools for conducting DNS Analysis and host identification. Then, you'll learn about network discovery and OSINT analysis. Finally, you will go through how to use that information to conduct a social engineering attack. When you’re finished with this course, you will have the skills and knowledge to conduct proper information gathering of assets and resources openly broadcasted to the world needed to lockdown, harden, and secure your company in today’s cyber world.

Enroll now

What's inside

Syllabus

Course Overview
Introduction
DNS Analysis
OSINT Analysis
Read more
Conduct Social Engineering Attack
Live Host Identification
Network Discovery, Port, and Protocol Analysis

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Introduces learners to information gathering techniques in Kali Linux, a leading operating system for security professionals
Suitable for both blue and red team cybersecurity professionals seeking to improve their information gathering skills
Covers a range of essential information gathering tools, including DNS analysis, OSINT analysis, and social engineering
Provides hands-on practice through live host identification and network discovery
Teaches skills that are highly relevant in both industry and academic settings for cybersecurity professionals
Taught by Mike Woolard, an experienced cybersecurity professional

Save this course

Save Information Gathering with Kali Linux to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Information Gathering with Kali Linux with these activities:
Review Kali Linux Revealed
Provides a foundation of Kali Linux and ethical hacking skills and techniques as described by the course instructor.
Show steps
  • Read chapters 1-4
  • Complete the exercises at the end of each chapter
  • Review the glossary and index for clarification and reinforcement
Practice DNS Analysis Using Kali Linux
Improves your understanding of DNS Analysis, preparing you for the course's exploration of information gathering techniques.
Show steps
  • Use the 'dig' command to perform DNS lookups and analyze the results
  • Learn about different types of DNS records and how to interpret them
  • Practice using DNS tools such as 'nslookup', 'host', and 'whois'
Network Discovery with Nmap Tutorial
Gain practical experience in network discovery using the Nmap tool through guided tutorials.
Browse courses on Network Discovery
Show steps
  • Follow an online tutorial or documentation on Nmap usage.
  • Set up a lab environment for network scanning.
  • Practice scanning techniques, including port scans, OS detection, and vulnerability assessment.
Ten other activities
Expand to see all activities and additional details
Show all 13 activities
DNS Analysis Exercises
Enhance your understanding of DNS analysis techniques through hands-on exercises.
Show steps
  • Identify DNS records and their significance (e.g., A, CNAME, MX).
  • Use tools like 'dig' and 'nslookup' to perform DNS queries.
  • Analyze DNS responses to gather information about hosts and networks.
Recon Tool Reference Card
Create a handy reference card for frequently used reconnaissance tools in Kali Linux.
Browse courses on OSINT
Show steps
  • List down important tools for specific recon tasks (e.g., DNS analysis, host identification).
  • Create a cheat sheet with tool commands, syntax, and usage examples.
  • Optionally, include tips and tricks for optimizing recon efficiency.
Follow the Kali Linux Official Website Tutorials
Provides hands-on experience with the tools and techniques covered in the course.
Browse courses on Information Gathering
Show steps
  • Visit the Kali Linux official website
  • Browse the available tutorials and select one that aligns with the course content
  • Follow the steps outlined in the tutorial
Host Identification Practice
Practice is the best path to fluency with tools.
Show steps
  • Configure a target environment with multiple hosts
  • Use Kali tools to identify and gather information about hosts
Social Engineering Experiment Report
Design and execute a simple social engineering experiment to demonstrate its effectiveness and potential risks.
Browse courses on Social Engineering
Show steps
  • Choose a target group and define success metrics.
  • Craft a social engineering scenario (e.g., phishing email, fake website).
  • Deploy the experiment and monitor results.
  • Write a report summarizing the experiment, findings, and lessons learned.
Perform Host Identification Exercises
Develops your ability to identify hosts and gathers essential information, enhancing your information gathering skills.
Browse courses on Networking
Show steps
  • Use the 'nmap' command to scan networks and identify hosts
  • Analyze the results of the scan to gather information about the hosts
  • Use other tools such as 'arping' and 'ping' to further identify and characterize hosts
Create a Guide for Using the 'Social Engineering Toolkit' (SET)
Demonstrates your understanding of social engineering techniques and provides a valuable resource for future reference.
Show steps
  • Install and configure the 'Social Engineering Toolkit' (SET)
  • Create a phishing template and send it to a test email address
  • Document the steps involved in using SET to conduct social engineering attacks
Develop a Reconnaissance Plan for a Target Website
Applies the principles and techniques learned in the course to a practical scenario, deepening your understanding of information gathering.
Browse courses on Reconnaissance
Show steps
  • Select a target website
  • Conduct a comprehensive DNS Analysis
  • Perform host identification and network discovery
  • Conduct an OSINT analysis
  • Create a report detailing your findings and recommendations for further reconnaissance
Compile a List of Online Resources for Information Gathering
Provides a valuable reference for future information gathering tasks, enhancing your overall knowledge and efficiency.
Browse courses on Information Gathering
Show steps
  • Search for and identify online resources related to information gathering
  • Categorize the resources based on their purpose and scope
  • Create a document or spreadsheet to organize and present the resources
Identify and Reach Out to Information Security Professionals
Connects you with experienced professionals who can provide guidance and support, enriching your learning experience.
Browse courses on Mentorship
Show steps
  • Attend industry events and conferences
  • Join online communities and forums
  • Reach out to professionals on LinkedIn and request a brief informational interview

Career center

Learners who complete Information Gathering with Kali Linux will develop knowledge and skills that may be useful to these careers:
Information Security Analyst
An Information Security Analyst is responsible for protecting an organization's computer networks and systems from unauthorized access, use, disclosure, disruption, modification, or destruction. This course can help Information Security Analysts to gather information about potential threats to their organization's systems. By understanding the tools and techniques used by attackers, Information Security Analysts can better protect their organization's assets.
Penetration Tester
A Penetration Tester is responsible for evaluating the security of an organization's computer networks and systems by simulating attacks. This course can help Penetration Testers to gather information about an organization's systems and identify potential vulnerabilities. By understanding the tools and techniques used by attackers, Penetration Testers can better assess the security of an organization's systems.
Network Security Engineer
A Network Security Engineer is responsible for designing, implementing, and maintaining an organization's network security systems. This course can help Network Security Engineers to gather information about an organization's network security needs and develop effective security solutions. By understanding the tools and techniques used by attackers, Network Security Engineers can better protect their organization's assets.
Security Engineer
A Security Engineer is responsible for designing, implementing, and maintaining an organization's security systems. This course can help Security Engineers to gather information about an organization's security needs and develop effective security solutions. By understanding the tools and techniques used by attackers, Security Engineers can better protect their organization's assets.
Cybersecurity Analyst
A Cybersecurity Analyst is responsible for analyzing and investigating cybersecurity threats and incidents. This course can help Cybersecurity Analysts to gather information about cybersecurity threats and develop effective response strategies. By understanding the tools and techniques used by attackers, Cybersecurity Analysts can better protect their organization's assets.
Computer Forensics Investigator
A Computer Forensics Investigator is responsible for investigating computer crimes and recovering evidence from digital devices. This course can help Computer Forensics Investigators to gather information about computer crimes and develop effective investigation strategies. By understanding the tools and techniques used by attackers, Computer Forensics Investigators can better identify and recover evidence.
Security Architect
A Security Architect is responsible for designing and implementing an organization's security architecture. This course can help Security Architects to gather information about an organization's security needs and develop effective security solutions. By understanding the tools and techniques used by attackers, Security Architects can better protect their organization's assets.
Security Consultant
A Security Consultant provides advice and guidance to organizations on how to improve their security posture. This course can help Security Consultants to gather information about an organization's security needs and develop effective security solutions. By understanding the tools and techniques used by attackers, Security Consultants can better assess the security of an organization's systems.
Security Manager
A Security Manager is responsible for overseeing an organization's security program and ensuring compliance with laws and regulations. This course can help Security Managers to gather information about an organization's security needs and develop effective security solutions. By understanding the tools and techniques used by attackers, Security Managers can better assess the security of their organization's systems and processes.
Network Administrator
A Network Administrator is responsible for managing and maintaining an organization's network infrastructure. This course can help Network Administrators to gather information about an organization's network infrastructure and identify potential security vulnerabilities. By understanding the tools and techniques used by attackers, Network Administrators can better protect their organization's assets.
Systems Administrator
A Systems Administrator is responsible for managing and maintaining an organization's computer networks and systems. This course can help Systems Administrators to gather information about an organization's systems and identify potential security vulnerabilities. By understanding the tools and techniques used by attackers, Systems Administrators can better protect their organization's assets.
Security Analyst
A Security Analyst is responsible for monitoring and analyzing an organization's security systems and data to identify potential security threats. This course can help Security Analysts to gather information about an organization's security systems and data and identify potential security vulnerabilities. By understanding the tools and techniques used by attackers, Security Analysts can better protect their organization's assets.
Information Technology Auditor
An Information Technology Auditor is responsible for auditing an organization's information technology systems and processes to ensure compliance with laws and regulations. This course can help Information Technology Auditors to gather information about an organization's IT systems and processes and identify potential compliance issues. By understanding the tools and techniques used by attackers, Information Technology Auditors can better assess the security of an organization's IT systems.
Ethical Hacker
An Ethical Hacker is responsible for legally and ethically hacking into an organization's computer networks and systems to identify vulnerabilities. This course can help Ethical Hackers to gather information about an organization's systems and identify potential vulnerabilities. By understanding the tools and techniques used by attackers, Ethical Hackers can better assess the security of an organization's systems.
Database Administrator
A Database Administrator is responsible for managing and maintaining an organization's databases. This course can help Database Administrators to gather information about an organization's databases and identify potential security vulnerabilities. By understanding the tools and techniques used by attackers, Database Administrators can better protect their organization's assets.

Reading list

We've selected nine books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Information Gathering with Kali Linux.
Comprehensive guide to information gathering, exploring various tools and techniques. It's a valuable resource for both beginners and experienced professionals.
Provides a practical guide to penetration testing, covering information gathering techniques. It includes real-world examples and in-depth analysis.
Explores advanced penetration testing techniques, including information gathering. It's a valuable resource for experienced professionals looking to enhance their skills.
Offers a comprehensive overview of network security assessment, including information gathering techniques. It's a valuable resource for understanding the principles and methodologies of network security.
Introduces various open-source tools used in penetration testing, including information gathering. It's a practical guide with step-by-step instructions.
Provides insights into social engineering techniques and how to protect against them. It's an essential read for understanding the human vulnerabilities exploited in information gathering.
Provides comprehensive coverage of Metasploit, including its use in information gathering. It's a valuable resource for understanding the capabilities of this powerful tool.
Covers web application security assessment, including information gathering techniques. It's a valuable resource for understanding the principles and methodologies of web application hacking.
Covers the fundamentals of DNS and BIND, including techniques for DNS analysis. It's a valuable reference for understanding the role of DNS in information gathering.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Information Gathering with Kali Linux.
Kali Linux Concepts and Basic Functionality
Most relevant
Real-World Ethical Hacking: Hands-on Cybersecurity
Technical Information Gathering with theHarvester
Building a Cybersecurity Home Lab Environment
Web Application Analysis with Kali Linux
Practice Your First Penetration Test: Kali & Metasploit...
Kali Linux
Post Exploitation with Kali Linux
Start Kali Linux, Ethical Hacking and Penetration Testing!
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser