Module 4 Summary
Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or
Already have an account? Sign In »

Video Transcription
00:00
just before the quick recap.
00:03
We cannot go through all the tools in detail, but I just wanted Thio to provide you with the information where to even start with the tool part. Off open source Intelligence Performing Austin is about taking the little bits and pieces of information that you are able to extrapolate about a particular person or entity
00:21
and pulling the thread on it by running that information through all sent tools
00:25
to see what more can be discovered about the target. So to sum up in this module, number four called tools and Techniques. We went on, um, or technical journey through ascent, which included search engines with an emphasis on Google hacking,
00:40
then through social letters and the most popular related tools to them. After that, techniques and tools for exploring user name and emails.
00:49
Then we moved on to more dangerous area with leaks and data breaches. And finally, we got to my personal favorite topic about tools, which you can use against the I T systems. But in a good way.
01:00
The next module, called sock puppets, is dedicated to truthful impersonation off fake persons.
01:07
Does that make sense?
01:10
Maybe not. Either way, thanks and see you in the next video
Up Next
Instructed By
Similar Content