CEH v12: Footprinting and Social Engineering Recon and Countermeasures

placeholder

If you;re engaged in a security assessment mapping your target public network presence is a critical step in that process.

In this course you;ll learn how to discover the public network information associated with your target using WHOIS and DNS services. Next you;ll explore a few commonly used footprinting tools that will help you with not only the exam but in real life as well. You;ll move on to examine how you can use social engineering techniques like shoulder surfing and dumpster diving to obtain useful or sensitive information about your target organization. Finally you;ll learn about some security controls that could be recommended to a client to help them better protect against an attacker footprinting and recon efforts.

This course is one in a series that helps to prepare you for the Certified Ethical Hacker v12 (312-50) exam.