CEH v11: Footprinting and Social Engineering Recon & Countermeasures

placeholder

If you;re engaged in a security assessment mapping your target public network presence is a critical step in that process. In this course you;ll learn how to discover the public network info associated with your target. Next you;ll explore a few commonly used footprinting tools that will help you with not only the exam but that can be used in real life as well. You;ll move on to examine how you can use social engineering techniques like shoulder surfing and dumpster diving to obtain useful or sensitive information about your target organization. Finally you;ll learn about some security controls that could be recommended to a client to help them better protect against an attacker footprinting and recon efforts. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.