Performing and Analyzing Network Reconnaissance

Seeing what is currently being exposed about your networks and company resources is vital. This course will provide a fundamental understanding of both reconnaissance and scanning and how it can affect your security posture.
Course info
Rating
(24)
Level
Beginner
Updated
Dec 19, 2018
Duration
7h 25m
Table of contents
Course Overview
The Two Steps
Initially What Do You Look For?
The More You Look, the More You Find
Other Reconnaissance Techniques
Reconnaissance via Google Hacking
Let's Not Forget PowerShell
Overview of Scanning
Understanding the 3-way Handshake
Checking for 'Live' Systems and Their Open Ports
Types of Scanning
Banner Grabbing and OS Fingerprinting
More Tools for the Utility-belt
Threats from Wireless
Description
Course info
Rating
(24)
Level
Beginner
Updated
Dec 19, 2018
Duration
7h 25m
Description

You've been tasked as an "Incident Handler" and you are wondering where you start. Attackers typically start with doing a little "reconnaissance" of their target, so it only makes sense that you start there as well. In this course, Performing and Analyzing Network Reconnaissance, you will learn how to think like an attacker in order to stay a step ahead of one. First, you will learn about the two different steps of reconnaissance and scanning. Next, you will learn what to look for, how it's done, and what you can do to protect your infrastructures. Finally, you will learn about tools you can use that the attacker will use against you. By the end of this course, you'll know how to look at your infrastructure the same way attackers do, and understand the process to minimize those threats.

About the author
About the author

Dale Meredith received his Certified Ethical Hacker and Certified EC-Counsel Instructor certifications back in 2006, as well as being a Microsoft Certified Trainer since 1998 (yes we had computers back then). Dale takes great pride in helping students comprehend and simplify complex IT concepts.

More from the author
More courses by Dale Meredith
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
Hey, everybody. This is dale Meredith, and welcome to my course, Performing and Analyzing Network Reconnaissance. Give you a little bit of background about myself. I am technical guy with a lot of technical certs from companies like Microsoft, EC-Council, and CompTIA. I'm a Microsoft and cybersecurity trainer and consultant for my own company, My Mentored Learning, and I also maintain my own security channel called Dale Dumbs it Down. This course is designed to kind of be a starting off point for several certifications. that are all focused around cybersecurity, ethical hacking and instant handling. That's starting off point is what we refer to as the reconnaissance stage. Meaning we want to see what is currently being exposed about our networks and company resources or, better yet, what could be exposed without our knowledge. This is done through several steps and tools. Among those tools is for you to start thinking like an attacker so you understand the how and why of reconnaissance. Now, some of the major topics that we'll talk about will be things like what to look for when we're doing a reconnaissance. We'll also look at some interesting online resources that can help you with reconnaissance that could possibly scare you a tad. We'll also make sure you understand why reconnaissance is so easily done. I'll give you a hint. It's because really, it is what it is. And, of course, we'll take a look at lots of tools that we can use and that attackers will use against you, and hopefully, by the end of this course, you'll know how to look at your infrastructure the exact same way that attackers do, and let's face it, knowing is half the battle. Now, before beginning this course, you should be familiar with the basics of networking, including things like TCP/IP and the basic knowledge of how to get around in Windows, iOS, Linux, in particular Kali Linux. And from here, you should feel comfortable diving into courses on CSA+, ECIH, GCIH or really any cybersecurity related courses for networks. So I hope you'll join me on this exciting journey on learning how to start thinking like an attacker with Performing and Analyzing Network Reconnaissance course here at Pluralsight.