25.8.14
This website uses cookies to ensure you get the best experience on our website. Learn more

CEH v12: Footprinting, Google Dorks, Search Engines, and Subdomains

Skillsoft issued completion badges are earned based on viewing the percentage required or receiving a passing score when assessment is required. Knowledge is power and in the ethical hacking game, the more you know about your target, the more likely you are to find a weakness in their security. In this course, you'll explore the practice of footprinting and the different types of information you can gather in this initial stage of attack. Next, you'll examine Google Dorks and some of the useful advanced search features of the Google search engine. You'll learn how to use the Shodan, Censys, and Thingful search engines to find IoT and other Internet-connected hosts and services in order to see the larger attack surface of a target. Finally, you'll explore subdomains and how they can lead to compromise if not properly managed, as well as some tools that can help you enumerate a target's subdomains. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v12 (312-50) exam.

Issued on

February 4, 2025

Expires on

Does not expire