- Overview
- Prerequisites
- Audience
- Audience
- Curriculum
Description:
This course provides a comprehensive understanding of the initial phase of ethical hacking, known as foot printing and reconnaissance. Participants will learn how to gather information about a target organization, identify potential vulnerabilities, and understand the importance of this phase in the overall penetration testing process. The curriculum covers techniques for collecting data from publicly available sources, using both manual and automated tools. Students will gain practical experience through hands-on labs, ensuring they can effectively apply these techniques in real-world scenarios. Emphasis is placed on the ethical considerations and legal implications of reconnaissance activities.
Course Code: BDT361
Duration: 2 Days
Learning Objectives:
- Understand the concepts of footprinting and reconnaissance
- Learn various techniques for information gathering
- Understand the legal and ethical implications of reconnaissance
- Identify and utilize tools for footprinting
- Develop skills to analyze and interpret gathered information
- Basic Understanding of Networking, Basic Knowledge of Operating Systems, Introduction to Cybersecurity Concepts.
- Aspiring ethical hackers, IT professionals, Cybersecurity professionals.
- Aspiring ethical hackers, IT professionals, Cybersecurity professionals.
Course Outline:
Module 1: Introduction to Footprinting and Reconnaissance
- Definition and importance
- Goals of footprinting
- Types of footprinting
- Ethical and legal consideration
Module 2: Information Gathering
- Overview of information gathering techniques
- Identifying network ranges
- Identifying active machines
- Finding open ports and services
Module 3: Passive Foot printing
- Definition and techniques
- Using search engines
- Social media reconnaissance
- WHOIS database
- DNS information gathering
- Tools for passive foot printing
Module 4: Active Footprinting
- Definition and techniques
- Network scanning
- Ping sweeps
- Traceroute analysis
- Tools for active footprinting
Module 5: Targeting Individuals
- Gathering personal information
- Email footprinting
- Social engineering techniques
- Tools for individual targeting
Module 6: Network Reconnaissance
- Identifying network topology
- Discovering firewall and IDS/IPS
- Banner grabbing
- Tools for network reconnaissance
Module 7: Web Footprinting
- Identifying web server and application details
- Directory and file enumeration
- Identifying website technologies
- Tools for web footprinting
Module 8: Tools and Techniques
- Overview of footprinting tools
- Nmap
- Maltego
- Shodan
- Recon-ng
- theHarvester
Module 9: Reporting and Documentation
- Analyzing collected data
- Creating a footprinting report
- Documentation best practices
- Presenting findings to stakeholders
Training Material Provided:
Yes (Digital format)