CEH v12: Recon Tools and Tactics

placeholder

Having knowledge of a target physical location can be useful for social engineering and physical security assessments.

In this course you;ll explore tools and tactics used to learn a target geographical location. Next you;ll examine how conducting Open Source Intelligence on social media sites can yield sensitive information through direct investigation or social engineering. You;ll move on to learn how to utilize job posts and job boards to search out useful target info like what technologies are being used names of legitimate users and areas that may be weak due to lack of staffing. Finally you;ll explore the large portion of the Internet that consists of the dark and deep webs and how these mostly unseen resources can be used to discover potentially sensitive info about a target.

This course is one in a series that helps to prepare you for the Certified Ethical Hacker v12 (312-50) exam.