CEH v11: Footprinting, Google Dorks, Search Engines & Sub-domains
Ethical Hacker v11 | Intermediate
- 4 Videos | 1h 5m 4s
- Includes Assessment
- Earns a Badge
Knowledge is power and in the ethical hacking game, the more you know about your target, the more likely you are to find a weakness in their security. In this course, you'll explore the practice of footprinting and the different types of information you can gather in this initial stage of attack. Next, you'll examine Google Dorks and some of the useful advanced search features of the Google search engine. You'll learn how to use the Shodan, Censys, and Thingful search engines to find IoT and other Internet-connected hosts and services in order to see the larger attack surface of a target. Finally, you'll explore sub-domains and how they can lead to compromise if not properly managed, as well as some tools that can help you enumerate a target's sub-domains. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.
WHAT YOU WILL LEARN
recognize the purpose of passive footprintingrecognize the different types of footprintingidentify the goal of active footprintingidentify the term used for Google keywords to locate sensitive information on the Internetidentify tools used to help with Google Dork searchesrecognize how to locate a specific document on the Internet
identify a tool used to locate devices connected to the Internetrecognize tools used to locate IoT devices on the Internetrecognize how to use Shodanidentify the Google Dork used to manually locate subdomainsrecognize a tool in Kali Linux that can be used to search for subdomainsidentify a website that can be used to search for subdomains
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platformDigital badges are yours to keep, forever.