Did you know Cybrary's video training is FREE? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.
This course will cover common tools used during the footprinting/reconnaissance phase of the penetration testing methodology.
Module 1: Introduction
Module 3: Shodan and Other Search Engines
Module 5: HTTrack
Module 6: theHarvester
Module 8: Social Engineering
Module 9: Course Summary
This course will cover common tools used during the footprinting/reconnaissance phase of the penetration testing methodology. This is commonly known as information gathering. If you think about it, all of us do some form of information gathering on a daily basis, from researching new restaurants to locating people on social media. In this course, we will use Microsoft as a target in many of the labs, since most students around the world will recognize their name. Disclaimer: I want to stress that we will not be attacking any systems in this course and will only be looking at publicly available information to practice the tools. Performing an actual penetration test, without permission, may be a crime in your jurisdiction, so please remember to "play it safe" and don't do the hands-on component of this course if it is illegal in your jurisdiction.
Complete this course and earn a Footprinting and Reconnaissance Certificate of Completion