.MP4, AVC, 1280x720, 30 fps | English, AAC, 2 Ch | 4h 6m | 746 MB
Instructor: Dale Meredith
Reconnaissance/Footprinting is the first phase attackers perform. This course will teach you the skills attackers use, which is needed for the CEH Exam.
You’ve chosen your target, now it’s time to gain intel about your target without their knowledge. In this course, Ethical Hacking: Reconnaissance/Footprinting, you’ll learn how attackers start profiling your organization.
First, you’ll explore the concept of reconnaissance/footprinting and why it’s such an important phase of attack. Next, you’ll discover how to use search engines and web services to give you a better picture of your target and their resources. Finally, you’ll learn how to use some of the industry's top tools to gather and document your findings.
TO MAC USERS: If RAR password doesn't work, use this archive program:
RAR Expander 0.8.5 Beta 4 and extract password protected files without error.
TO WIN USERS: If RAR password doesn't work, use this archive program:
Latest Winrar and extract password protected files without error.