We may earn an affiliate commission when you visit our partners.
Dale Meredith

Reconnaissance/Footprinting is the first phase attackers perform. This course will teach you the skills attackers use, which is needed for the CEH Exam.

Read more

Reconnaissance/Footprinting is the first phase attackers perform. This course will teach you the skills attackers use, which is needed for the CEH Exam.

You’ve chosen your target, now it’s time to gain intel about your target without their knowledge. In this course, Ethical Hacking: Reconnaissance/Footprinting, you’ll learn how attackers start profiling your organization. First, you’ll explore the concept of reconnaissance/footprinting and why it’s such an important phase of attack. Next, you’ll discover how to use search engines and web services to give you a better picture of your target and their resources. Finally, you’ll learn how to use some of the industry's top tools to gather and document your findings. When you’re finished with this course, you’ll have the skills and knowledge of reconnaissance/footprinting needed for the Certified Ethical Hacker Exam.

Enroll now

Here's a deal for you

We found an offer that may be relevant to this course.
Save money when you learn. All coupon codes, vouchers, and discounts are applied automatically unless otherwise noted.

What's inside

Syllabus

Course Overview
Describing Reconnaissance/Footprinting
Using Search Engines against a Target
Capturing Intel through Web Services
Read more
Exploiting Social Media
Acquiring Intel From Websites
Derive Intel from Email
Examining Whois and DNS for Intel
Discovering Intel from Network Reconnaissance/Footprinting
Employing Social Engineering Tactics
Examining the Tools of Attackers and the Countermeasures
Domain Summary

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Examines reconnaissance/footprinting techniques, which are highly relevant to ethical hacking
Provides practical knowledge and skills to gather intel from search engines, web services, social media, websites, email, and network reconnaissance
Taught by Dale Meredith, who is an experienced instructor in ethical hacking

Save this course

Save Ethical Hacking: Reconnaissance/Footprinting to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Ethical Hacking: Reconnaissance/Footprinting with these activities:
Seek a Mentor with Reconnaissance/Footprinting Expertise
Enhance your learning by connecting with an experienced professional who can provide personalized guidance and support on reconnaissance techniques.
Show steps
  • Identify potential mentors
  • Reach out and introduce yourself
  • Set up regular meetings or communication channels
Review Basics of Network Reconnaissance Techniques
Refresh your knowledge of basic network reconnaissance techniques before starting the course to ensure a solid foundation for advanced concepts.
Browse courses on Network Reconnaissance
Show steps
  • Review TCP/IP fundamentals
  • Practice using port scanning tools
  • Explore network sniffing techniques
Compile Course Resources and Materials
Maximize your learning by organizing and reviewing course materials, ensuring you have a comprehensive understanding of the concepts covered.
Show steps
  • Gather lecture notes
  • Review presentations and demos
  • Organize and summarize materials
  • Identify areas for further exploration
One other activity
Expand to see all activities and additional details
Show all four activities
Navigate Social Media for Reconnaissance
Enhance your ability to leverage social media for reconnaissance by following guided tutorials that showcase effective techniques.
Browse courses on Social Engineering
Show steps
  • Create and manage social media accounts for reconnaissance purposes
  • Use social media search tools
  • Engage in social engineering tactics to gather information

Career center

Learners who complete Ethical Hacking: Reconnaissance/Footprinting will develop knowledge and skills that may be useful to these careers:
Information Security Analyst
An Information Security Analyst researches, plans, and implements security measures to protect an organization's computer networks and systems. This course provides a solid foundation for a career in information security analysis. It teaches the skills and knowledge needed to gather and document information about a target organization, which is a critical part of an information security analyst's job. The course also covers some of the industry's top tools for gathering and documenting information, which will give you a leg up on the competition.
Cyber Security Analyst
A Cyber Security Analyst plans and implements security measures to protect an organization's computer networks and systems. This course provides a solid foundation for a career in cyber security analysis. It teaches the skills and knowledge needed to gather and document information about a target organization, which is a critical part of a cyber security analyst's job. The course also covers some of the industry's top tools for gathering and documenting information, which will give you a leg up on the competition.
Network Security Analyst
A Network Security Analyst plans and implements security measures to protect an organization's computer networks. This course can be useful for network security analysts because it teaches the skills and knowledge needed to gather and document information about a target organization's network, which is a critical part of a network security analyst's job.
Security Engineer
A Security Engineer designs, implements, and maintains security measures to protect an organization's computer networks and systems. This course can be useful for security engineers because it teaches the skills and knowledge needed to gather and document information about a target organization, which is a critical part of a security engineer's job.
Ethical Hacker
An Ethical Hacker uses their skills to identify and exploit vulnerabilities in an organization's computer networks and systems, with the goal of improving the organization's security. This course is an excellent way to learn the skills and knowledge needed to become an ethical hacker. It teaches the techniques that attackers use to gather and document information about a target organization, which is a critical part of an ethical hacker's job.
Penetration Tester
A Penetration Tester uses their skills to identify and exploit vulnerabilities in an organization's computer networks and systems, with the goal of improving the organization's security. This course provides a foundation for a career in penetration testing by teaching the skills and knowledge needed to gather and document information about a target organization, which is a critical part of a penetration tester's job.
Security Consultant
A Security Consultant provides advice and guidance to organizations on how to improve their security posture. This course provides a foundation for a career in security consulting by teaching the skills and knowledge needed to gather and document information about a target organization, which is a critical part of a security consultant's job. The course also covers some of the industry's top tools for gathering and documenting information, which will give you a leg up on the competition.
Computer Forensics Analyst
A Computer Forensics Analyst examines digital evidence to determine how a computer crime was committed. This course may be useful for computer forensics analysts because it teaches the techniques that attackers use to gather and document information about a target organization, which is a critical part of a computer forensics analyst's job.
Information Security Manager
An Information Security Manager develops and implements security policies and procedures to protect an organization's computer networks and systems. This course may be useful for information security managers because it teaches the techniques that attackers use to gather and document information about a target organization, which is a critical part of an information security manager's job.
IT Auditor
An IT Auditor reviews an organization's computer systems and procedures to ensure that they are secure. This course may be useful for IT auditors because it teaches the techniques that attackers use to gather and document information about a target organization, which is a critical part of an IT auditor's job.
Software Developer
A Software Developer designs, develops, and maintains software applications. This course may be useful for software developers because it teaches the techniques that attackers use to gather and document information about a target organization, which can help software developers to design and develop more secure software applications.
Web Developer
A Web Developer designs, develops, and maintains websites. This course may be useful for web developers because it teaches the techniques that attackers use to gather and document information about a target organization, which can help web developers to design and develop more secure websites.
Network Engineer
A Network Engineer designs, implements, and maintains computer networks. This course may be useful for network engineers because it teaches the techniques that attackers use to gather and document information about a target organization, which can help network engineers to better secure the networks they design, implement, and maintain.
Systems Administrator
A Systems Administrator manages and maintains computer systems and networks. This course may be useful for systems administrators because it teaches the techniques that attackers use to gather and document information about a target organization, which can help systems administrators to better secure the systems and networks they manage.
Database Administrator
A Database Administrator manages and maintains databases. This course may be useful for database administrators because it teaches the techniques that attackers use to gather and document information about a target organization, which can help database administrators to better secure the databases they manage.

Reading list

We've selected 11 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Ethical Hacking: Reconnaissance/Footprinting.
Provides a comprehensive view of network penetration testing, offering a broader context for the course's focus on reconnaissance and footprinting.
Provides practical insights into penetration testing techniques, complementing the course's emphasis on ethical hacking practices.
Provides a comprehensive overview of network forensics. It covers all of the topics that are essential for network forensics professionals, including reconnaissance/footprinting. This book valuable resource for anyone who wants to learn more about network forensics.
Provides a comprehensive overview of firewalls and intrusion detection systems. It covers all of the topics that are essential for network security professionals, including reconnaissance/footprinting. This book valuable resource for anyone who wants to learn more about firewalls and intrusion detection systems.
Provides a comprehensive overview of cryptography and network security. It covers all of the topics that are essential for network security professionals, including reconnaissance/footprinting. This book valuable resource for anyone who wants to learn more about cryptography and network security.
Provides a comprehensive overview of network security. It covers all of the topics that are essential for network security professionals, including reconnaissance/footprinting. This book valuable resource for anyone who wants to learn more about network security.
Provides a comprehensive overview of network security monitoring. It covers all of the topics that are essential for network security professionals, including reconnaissance/footprinting. This book valuable resource for anyone who wants to learn more about network security monitoring.
Provides a comprehensive overview of network security assessment. It covers all of the phases of a network security assessment, including reconnaissance/footprinting. This book valuable resource for anyone who wants to learn more about network security assessment.
Provides a comprehensive overview of computer security, creating a solid foundation for understanding the principles behind reconnaissance and footprinting.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser