CEH v12: Footprinting and Social Engineering Recon and Countermeasures
Skillsoft issued completion badges are earned based on viewing the percentage required or receiving a passing score when assessment is required. If you're engaged in a security assessment, mapping your target's public network presence is a critical step in that process.
In this course, you'll learn how to discover the public network information associated with your target using WHOIS and DNS services. Next, you'll explore a few commonly used footprinting tools that will help you with not only the exam, but in real life as well. You'll move on to examine how you can use social engineering techniques like shoulder surfing and dumpster diving to obtain useful or sensitive information about your target's organization. Finally, you'll learn about some security controls that could be recommended to a client to help them better protect against an attacker's footprinting and recon efforts.
This course is one in a series that helps to prepare you for the Certified Ethical Hacker v12 (312-50) exam.