Performing and Analyzing Network Reconnaissance

Seeing what is currently being exposed about your networks and company resources is vital. This course will provide a fundamental understanding of both reconnaissance and scanning and how it can affect your security posture.
Course info
Level
Beginner
Updated
February 28, 2017
Duration
7h 24m
Table of contents
The Two Steps
35m 25s
Description
Course info
Level
Beginner
Updated
February 28, 2017
Duration
7h 24m
Description

You've been tasked as an "Incident Handler" and you are wondering where you start. Attackers typically start with doing a little "reconnaissance" of their target, so it only makes sense that you start there as well. In this course, Performing and Analyzing Network Reconnaissance, you will learn how to think like an attacker in order to stay a step ahead of one. First, you will learn about the two different steps of reconnaissance and scanning. Next, you will learn what to look for, how it's done, and what you can do to protect your infrastructures. Finally, you will learn about tools you can use that the attacker will use against you. By the end of this course, you'll know how to look at your infrastructure the same way attackers do, and understand the process to minimize those threats.

About the author
About the author

Dale Meredith received his Certified Ethical Hacker and Certified EC-Counsel Instructor certifications back in 2006, as well as being a Microsoft Certified Trainer since 1998 (yes we had computers back then). Dale takes great pride in helping students comprehend and simplify complex IT concepts.

More from the author
Secure Software Development
Beginner
3h 15m
12 Sep 2017
More courses by Dale Meredith
Transcript
Transcript

Hi everyone, my name is Dale Meredith and welcome to my course Performing and Analyzing Network Reconnaissance.

I am a technical guy with lots of technical certs from both Microsoft, EC-Counsel and CompTIA. I’m a Microsoft and cybersecurity trainer/consultant for my own company, My Mentored Learning, and I maintain my own Security YouTube Channel called DaleDumbsITDown.

This course is designed to be a starting off point for several certifications that are focused on cybersecurity, ethical hacking and incident handling. That “start off” point is what we refer to as the Recon stage, meaning we want to see what is currently being exposed about our networks and company resources....or better yet, what could be exposed without our knowledge. This is done via several steps and tools. Among those tools is for you to start thinking like an attacker so you understand the ���how and why” of reconnaissance.

Some of the major topics that we will cover include:

  1. What to look for when reconning
  2. Online resources that might scare you
  3. Why reconnaissance is so easily done...it because “it is what it is”
  4. Tools we can use that attacker WILL use against you
By the end this course, you’ll know how to look at your infrastructure the same way that attackers do, and let’s face it, Knowing is half the battle.

Before beginning the course you should be familiar with the basics of networks including TCP/IP and a basic knowledge of Windows, IOS and Kali-Linux.

From here, you should feel comfortable diving into [topic title] with courses on:
  1. CSA+
  2. ECIH
  3. GCIH
  4. Any other cybersecurity related course for networks
I hope you’ll join me on this journey to learn how to start thinking like an attacker with the Performing and Analyzing Network Reconnaissance course, at Pluralsight.