Information Gathering: Basic to Intermediate Level Course
Description
Dear Students,
Welcome to our course on Information Gathering also known as Reconnaissance.
You might have taken a course on Hacking/Penetration testing but have you ever wonder how to initiate an attack as a Penetration tester?
This course forms the basis for anyone who wants to become a real-time penetration tester. Our other courses will have taught you how to perform an attack, but this course will form the foundation on which we teach you how to research and gather information about your target as a security enthusiast without leaving any traces.
In this course, we will teach you how an attacker gathers information about their target (which may be an individual or an organization) in an ethical way. This course helps the participant to understand the various methods and means by which an attacker gathers confidential information before launching an attack.
We have designed this course to enable those aspiring to enter the information security field to learn the basic or the preparation steps that one needs to take care of before jumping into real time attacks. By the end of this course, you will be familiar with how attackers gather various types of information such as Individual, organizational, web based, system based and network based information before launching an attack.
This course has been specifically designed by a team of information security researchers who are acknowledged experts in their field.
This course has been designed to accelerate your learning process through the use of creative animations and easy to understand voice over narratives.
Complex hacking concepts have been broken down into easy to understand modules.
Together, our team will walk you through the entire learning process step by step.
This course is perfect for anybody who is passionate about developing their skills in the field of internet security. No prior training is required to take this course as we will start with the basics. We welcome anyone with a thirst for learning.
We look forward to having you join us. In the meantime, please feel free to take a look at our demo tutorial and exercise before you purchase the full course.
What You’ll Learn
- Understand how one’s online identity can easily be found and how to protect yourself.
- Learn how to maintain anonymity online.
- Learn how an individual’s information can be gathered!
- Understand how mail based probes can leak sensitive information!
- Understand how an organization’s information can be collected!
- Learn how web based, network based and system based information can be gathered!
- Learn how Google helps in information gathering.
- Learn how humans are the weakest link in extracting sensitive information.
Are there any course requirements or prerequisites?
- This course includes all the material required either as video or as a downloadable link hence there is no pre required materials or softwares for this course.
- No prior training is required to take this course as we will start with the basics.
- We welcome anyone with a thirst for learning
Who this course is for:
- This course forms the basis for anyone who wants to become a real-time penetration tester, hence student with no prior knowledge on Information security can opt for this course.
- This course is perfect for existing system administrators, network architects, network administrators, network security professionals, web designers as well as anybody who is passionate about developing their skills in the field of internet security.
- We have designed this course to enable those aspiring to enter the information security field to learn the basic or the preparation steps that one needs to take care of before jumping into real time attacks.
- Very rarely this course consist of software codes, however those codes are explained in a detailed manner. Hence one shouldn’t bother about prior coding knowledge.
- By the end of this course, you will be familiar with how attackers gather various types of information such as Individual, organizational, web based, system based and network based information before launching an attack .
Courses You May Like
- 37 Lessons
- 0 week
Virus, Worm, Trojan, Backdoor & Antivirus-Malware and Security
- 0 Students