Whether you work on the blue team within your company or are hired as a red teamer to help harden a company’s defense, knowing what vulnerabilities you are broadcasting to the world is important. In this course, Information Gathering with Kali Linux, you’ll learn to run the information gathering set of tools to conduct the reconnaissance step in the cyber kill chain. First, you will explore tools for conducting DNS Analysis and host identification. Then, you'll learn about network discovery and OSINT analysis. Finally, you will go through how to use that information to conduct a social engineering attack. When you’re finished with this course, you will have the skills and knowledge to conduct proper information gathering of assets and resources openly broadcasted to the world needed to lockdown, harden, and secure your company in today’s cyber world.
Overview
Whether you work on the blue team within your company or are hired as a red teamer to help harden a company’s defense, knowing what vulnerabilities you are broadcasting to the world is important. In this course, Information Gathering with Kali Linux, you’ll learn to run the information gathering set of tools to conduct the reconnaissance step in the cyber kill chain. First, you will explore tools for conducting DNS Analysis and host identification. Then, you'll learn about network discovery and OSINT analysis. Finally, you will go through how to use that information to conduct a social engineering attack. When you’re finished with this course, you will have the skills and knowledge to conduct proper information gathering of assets and resources openly broadcasted to the world needed to lockdown, harden, and secure your company in today’s cyber world.
Syllabus
- Course Overview 1min
- Introduction 6mins
- DNS Analysis 16mins
- OSINT Analysis 15mins
- Conduct Social Engineering Attack 8mins
- Live Host Identification 9mins
- Network Discovery, Port, and Protocol Analysis 17mins
Taught by
Mike Woolard