Information Gathering with Kali Linux
This course is all about introducing the learner to the 01 Information Gathering section of Kali . You’ll learn about about a few of the tools available on the Kali platform and how they can be used to gather key information on your target.
Whether you work on the blue team within your company or are hired as a red teamer to help harden a company’s defense, knowing what vulnerabilities you are broadcasting to the world is important. In this course, Information Gathering with Kali Linux, you’ll learn to run the information gathering set of tools to conduct the reconnaissance step in the cyber kill chain. First, you will explore tools for conducting DNS Analysis and host identification. Then, you’ll learn about network discovery and OSINT analysis. Finally, you will go through how to use that information to conduct a social engineering attack. When you’re finished with this course, you will have the skills and knowledge to conduct proper information gathering of assets and resources openly broadcasted to the world needed to lockdown, harden, and secure your company in today’s cyber world.
Author Name: Mike Woolard
Author Description:
Mike is an information security manager who has worked in the IT and Information Security fields for 22+ years. A broad background from helpdesk to sysadmin, system engineer, networking, DB and development work. Most of Mike’s work now centers around pentests and risk assessments, but an integral part will always be awareness training. An active member in various local security groups, Mike volunteers, speaks, or attends various information security cons.
Table of Contents
- Course Overview
1min - Introduction
6mins - DNS Analysis
16mins - OSINT Analysis
15mins - Conduct Social Engineering Attack
8mins - Live Host Identification
9mins - Network Discovery, Port, and Protocol Analysis
17mins
There are no reviews yet.