Overview

This course will cover common tools used during the footprinting/reconnaissance phase of the penetration testing methodology.

Course Content

Course Description

This course will cover common tools used during the footprinting/reconnaissance phase of the penetration testing methodology. This is commonly known as information gathering. If you think about it, all of us do some form of information gathering on a daily basis, from researching new restaurants to locating people on social media. In this course, we will use Microsoft as a target in many of the labs, since most students around the world will recognize their name. Disclaimer: I want to stress that we will not be attacking any systems in this course and will only be looking at publicly available information to practice the tools. Performing an actual penetration test, without permission, may be a crime in your jurisdiction, so please remember to "play it safe" and don't do the hands-on component of this course if it is illegal in your jurisdiction.

Instructed By

Instructor Profile Image
Ken Underhill
Master Instructor at Cybrary
Master Instructor
Certificate Of Completion

Complete this course and earn a Footprinting and Reconnaissance Certificate of Completion