This course offers a solid understanding of external footprinting techniques which are critical to developing an effective penetration tester. The curricula will challenge participants by starting with a real world company and enumerating 10,000+ IPv4/IPv6 addresses and domain names used by the company. You will also get to utilize 15+ techniques for identifying targets, gathering host information, hunting weak web applications, and prioritizing your efforts. When you have finished with this course, you should have a solid understanding of external footprinting, passive/active reconnaissance, and the techniques discussed in the Penetration Testing Execution Standard (PTES).
Prioritizing External Target List
Countermeasures and Reporting
The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.