You don't currently have access to this contentYou don't currently have access to this contentYou don't currently have access to this contentYou don't currently have access to this contentYou don't currently have access to this contentYou don't currently have access to this contentYou don't currently have access to this contentYou don't currently have access to this content
Information Security Premium Course

Mastering Web And Infrastructure Reconnaissance

Learn and understand various tools to perform Penetration Testing and how you can use them to your advantage and protection in a virtual Linux environment.

Subscribe for Full Access

Get this course and all premium content for as low as $33/month.

Subscribe now

Course Overview

When you perform a penetration test, finding one target is easy.  Detecting them all plus identifying the supporting infrastructure and other services is hard and needs a more structured approach.  And you need the experience to analyze and understand what your tools and techniques are telling you so that you can pivot around on the information to detect even more.

If you’re constantly wondering just how many targets you’ve missed over the years or what your tools really do, this class is for you.  In this class we will look at both passive and active methods from basic tools that you probably know a little bit already such as simple dig queries and Google hacking all the way up to enumerating hosts and ports with Nmap, finding forms with BurpSuite, and even automating scanning with Metasploit.  But we’ll get into even more depth on the tools to squeeze out every bit of information that can make or break our day.

What You
Will Learn

Inside
the ​Course

8 Lessons | 48 Topics | 8 Quizzes

Course Content

Expand All

Start Learning for as Little As $8 a Month!

Start Your FREE Two Week Trial

We are working day and night to bring you fresh courses every month. And we have brand new features in the works like guided career paths, hands-on labs and experiences, dedicated mentors, cyber range integration and so much more.

Related Courses

#
Featured Image for Business Continuity And Disaster Recovery Course.

Business Continuity And Disaster Recovery

#
Featured Image for Certified Information Systems Security Professional – CISSP Course.

Certified Information Systems Security Professional – CISSP

« » page 1 / 20