Moocable is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Conducting Passive Reconnaissance for CompTIA PenTest+

Description

Reconnaissance is the process of discovering information about the target before you engage. Passive Reconnaissance is doing this in a matter that leaves no trace, which helps to keep your identity under the hacker hoodie you're wearing. Attackers spend 70-80 percent of their time gathering information about their target. Doing so answers tons of questions that save them time while becoming active. It only makes sense that you as a security professional do the same. In this course, Conducting Passive Reconnaissance for CompTIA PenTest+, you will learn about effective untraceable information gathering, referred to as reconnaissance. First, you will see what information can be discovered about your target using public and open source information. Next, you will discover what WHOIS, nslookup, and even Google can expose about your target. Finally, you will explore some applications that are designed to help automate this phase of reconnaissance. When you’re finished with this course, you will have the skills and knowledge of passive reconnaissance needed to conduct a penetration test.

Tags

Conducting Passive Reconnaissance for CompTIA PenTest+

Affiliate notice

Reconnaissance is the process of discovering information about the target before you engage. Passive Reconnaissance is doing this in a matter that leaves no trace, which helps to keep your identity under the hacker hoodie you're wearing. Attackers spend 70-80 percent of their time gathering information about their target. Doing so answers tons of questions that save them time while becoming active. It only makes sense that you as a security professional do the same. In this course, Conducting Passive Reconnaissance for CompTIA PenTest+, you will learn about effective untraceable information gathering, referred to as reconnaissance. First, you will see what information can be discovered about your target using public and open source information. Next, you will discover what WHOIS, nslookup, and even Google can expose about your target. Finally, you will explore some applications that are designed to help automate this phase of reconnaissance. When you’re finished with this course, you will have the skills and knowledge of passive reconnaissance needed to conduct a penetration test.