Certified Ethical Hacker - Reconnaissance and Network Navigation
Understanding Reconnaissance, Footprinting, Scanning, Enumeration, and Sniffing
By Chad Russell
Publisher: O'Reilly Media
Final Release Date: December 2016
Run time: 2 hours 18 minutes
This is the first of a four-part series designed to help you prepare for the International Council of E-Commerce Consultant's Certified Ethical Hacker (CEH) exam. This course focuses on several key areas of knowledge tested in that exam: You will learn how to perform reconnaissance on companies, networks, systems, and people; how to conduct footprinting; how to exercise resource enumeration; how to sniff networks and scan them in order to better understand the attack landscape; and how to ethically gain access to systems, networks and data.
Course participants should possess a basic understanding of TCP/IP and Ethernet networking, as well as core familiarity with the Windows and Linux operating systems.
Gain the knowledge required to pass specific sections of the Certified Ethical Hacker exam
Learn how hackers gather information on companies, individuals, and various systems
Understand pen testing, Google dorking, TCP/IP handshaking, L2L7 sniffing, and more
Explore techniques used to scan networks, and enumerate network and application services
See how hackers sniff network traffic and build out topologies of target networks and systems
Acquire many of the real world skills needed to become a penetration tester
Chad Russell (CISSP, CCNP, MCSE) has been in the cyber security industry for over 15 years working for companies such as Oracle, Microsoft, and SAP. He conducts security risk assessments for customers throughout North America, teaches cyber security at Vatterott College, and holds a Bachelor of Computer Science degree from Excelsior College.