
Information Gathering: Basic to Intermediate Level Course
Curriculum
- 8 Sections
- 47 Lessons
- Lifetime
Expand all sectionsCollapse all sections
- Section 1: Introduction to Information Gathering3
- Section 2: Masking Identity14
- 2.03. Masking Identity1 Minute
- 2.1Quiz 2: Masking Identity1 Question
- 2.24. SSH Tunnelling4 Minutes
- 2.3Quiz 3: SSH Tunnelling1 Question
- 2.45. HTTP Tunnelling3 Minutes
- 2.5Quiz 4: HTTP Tunnelling1 Question
- 2.66. TOR – The Onion Routing2 Minutes
- 2.7Quiz 5: TOR1 Question
- 2.87. Proxy Chains1 Minute
- 2.9Quiz 6: Proxy Chains1 Question
- 2.108. Proxy Trojans4 Minutes
- 2.11Quiz 7: Proxy Trojans2 Questions
- 2.129. VPN2 Minutes
- 2.13Quiz 8: Virtual Private Network1 Question
- Section 3: Individual Profiling9
- 3.010. Social Profiling of an Individual3 Minutes
- 3.111. Career Profiling1 Minute
- 3.212. Exercise 1-Social and career profiling1 Minute
- 3.313. Exercise 2-Social and career profiling1 Minute
- 3.414. Automated Tracking of the Target information1 Minute
- 3.515. Email Address Harvesting1 Minute
- 3.6Quiz 9: Email Address Harvesting1 Question
- 3.716. Email Tracking2 Minutes
- 3.8Quiz 10: Email Tracking1 Question
- Section 4: Organization Profiling4
- Section 5: Web Based Information Gathering9
- 5.021. The Website1 Minute
- 5.1Quiz 11: Website Information Gathering1 Question
- 5.222. Website Architecture2 Minutes
- 5.323. Website Infrastructure2 Minutes
- 5.424. The Domain1 Minute
- 5.525. IP Address2 Minutes
- 5.6Quiz 12: IP Addresses3 Questions
- 5.726. Exercise 1-Website Information Gathering1 Minute
- 5.827. Exercise 2-Website Information Gathering1 Minute
- Section 6: Network Based Information Gathering4
- Section 7: System Based Information Gathering12
- 7.031. System Based Information Gathering1 Minute
- 7.132. Ports – A Brush Up3 Minutes
- 7.233. TCP and UDP Headers and Role of Flags3 Minutes
- 7.334. TCP or Full Open Scan and Half Open Scan2 Minutes
- 7.435. Idle Scan2 Minutes
- 7.536. ACK and FIN Scan1 Minute
- 7.637. NULL and XMAS Scan2 Minutes
- 7.738. Targeting the Operating System and Host Names1 Minute
- 7.839. Active OS Fingerprinting1 Minute
- 7.940. Passive OS fingerprinting1 Minute
- 7.1041. SMB Versioning1 Minute
- 7.11Quiz 14: System Based Information Gathering1 Question
- Section 8: The Essential Contents of Hacker’s Toolkit6