Certified Ethical Hacker (CEH) - Reconnaissance and Network Navigation
Video description
This is the first of a four-part series designed to help you prepare for the International Council of E-Commerce Consultant's Certified Ethical Hacker (CEH) exam. This course focuses on several key areas of knowledge tested in that exam: You will learn how to perform reconnaissance on companies, networks, systems, and people; how to conduct footprinting; how to exercise resource enumeration; how to sniff …
Certified Ethical Hacker (CEH) - Reconnaissance and Network Navigation
Video description
This is the first of a four-part series designed to help you prepare for the International Council of E-Commerce Consultant's Certified Ethical Hacker (CEH) exam. This course focuses on several key areas of knowledge tested in that exam: You will learn how to perform reconnaissance on companies, networks, systems, and people; how to conduct footprinting; how to exercise resource enumeration; how to sniff networks and scan them in order to better understand the attack landscape; and how to ethically gain access to systems, networks and data.
Course participants should possess a basic understanding of TCP/IP and Ethernet networking, as well as core familiarity with the Windows and Linux operating systems.
Gain the knowledge required to pass specific sections of the Certified Ethical Hacker exam
Learn how hackers gather information on companies, individuals, and various systems
Understand pen testing, Google dorking, TCP/IP handshaking, L2L7 sniffing, and more
Explore techniques used to scan networks, and enumerate network and application services
See how hackers sniff network traffic and build out topologies of target networks and systems
Acquire many of the real world skills needed to become a penetration tester
Chad Russell (CISSP, CCNP, MCSE) has been in the cyber security industry for over 15 years working for companies such as Oracle, Microsoft, and SAP. He conducts security risk assessments for customers throughout North America, teaches cyber security at Vatterott College, and holds a Bachelor of Computer Science degree from Excelsior College.
Footprinting Methods, Techniques And Tools - Part 1
00:03:21
Footprinting Methods, Techniques And Tools - Part 2
00:04:47
Google Dorking - Part 1
00:03:05
Google Dorking - Part 2
00:06:12
Website And Email Footprinting - Part 1
00:04:14
Website And Email Footprinting - Part 2
00:03:21
WhoIS, DNS And Network Data Gathering
00:04:36
Footprinting Tools And Countermeasures - Part 1
00:03:41
Footprinting Tools And Countermeasures - Part 2
00:02:42
Scanning Networks
TCP/IP Handshakes And Scan Types - Part 1
00:03:24
TCP/IP Handshakes And Scan Types - Part 2
00:05:46
TCP/IP Handshakes And Scan Types - Part 3
00:01:08
Scanning Tools And Techniques - Part 1
00:05:57
Scanning Tools And Techniques - Part 2
00:00:57
Scanning Tools And Techniques - Part 3
00:02:54
Scanning Tools And Techniques - Part 4
00:01:41
Vulnerability Scanning - Part 1
00:03:27
Vulnerability Scanning - Part 2
00:06:00
Enumeration
NetBIOS, SNMP And LDAP Enumeration - Part 1
00:04:00
NetBIOS, SNMP And LDAP Enumeration - Part 2
00:04:37
NTP And SMTP Discovery
00:03:06
Telnet, SMB And DNS
00:05:22
Sniffing
L2L7 Sniffing
00:05:04
Sniffing Tools And Countermeasures - Part 1
00:03:44
Sniffing Tools And Countermeasures - Part 2
00:02:45
Sniffing Tools And Countermeasures - Part 3
00:05:15
Sniffing Tools And Countermeasures - Part 4
00:01:39
Conclusion
Summary
00:01:07
Start your Free Trial Self paced Go to the Course We have partnered with providers to bring you collection of courses, When you buy through links on our site, we may earn an affiliate commission from provider.
This site uses cookies. By continuing to use this website, you agree to their use.I Accept