Information Gathering: Basic to Intermediate Level Course
Curriculum
- 8 Sections
- 47 Lessons
- Lifetime
Expand all sectionsCollapse all sections
- Section 1: Introduction to Information Gathering3
- Section 2: Masking Identity14
- 2.13. Masking Identity1 Minute
- 2.2Quiz 2: Masking Identity1 Question
- 2.34. SSH Tunnelling4 Minutes
- 2.4Quiz 3: SSH Tunnelling1 Question
- 2.55. HTTP Tunnelling3 Minutes
- 2.6Quiz 4: HTTP Tunnelling1 Question
- 2.76. TOR – The Onion Routing2 Minutes
- 2.8Quiz 5: TOR1 Question
- 2.97. Proxy Chains1 Minute
- 2.10Quiz 6: Proxy Chains1 Question
- 2.118. Proxy Trojans4 Minutes
- 2.12Quiz 7: Proxy Trojans2 Questions
- 2.139. VPN2 Minutes
- 2.14Quiz 8: Virtual Private Network1 Question
- Section 3: Individual Profiling9
- 3.110. Social Profiling of an Individual3 Minutes
- 3.211. Career Profiling1 Minute
- 3.312. Exercise 1-Social and career profiling1 Minute
- 3.413. Exercise 2-Social and career profiling1 Minute
- 3.514. Automated Tracking of the Target information1 Minute
- 3.615. Email Address Harvesting1 Minute
- 3.7Quiz 9: Email Address Harvesting1 Question
- 3.816. Email Tracking2 Minutes
- 3.9Quiz 10: Email Tracking1 Question
- Section 4: Organization Profiling4
- Section 5: Web Based Information Gathering9
- 5.121. The Website1 Minute
- 5.2Quiz 11: Website Information Gathering1 Question
- 5.322. Website Architecture2 Minutes
- 5.423. Website Infrastructure2 Minutes
- 5.524. The Domain1 Minute
- 5.625. IP Address2 Minutes
- 5.7Quiz 12: IP Addresses3 Questions
- 5.826. Exercise 1-Website Information Gathering1 Minute
- 5.927. Exercise 2-Website Information Gathering1 Minute
- Section 6: Network Based Information Gathering4
- Section 7: System Based Information Gathering12
- 7.131. System Based Information Gathering1 Minute
- 7.232. Ports – A Brush Up3 Minutes
- 7.333. TCP and UDP Headers and Role of Flags3 Minutes
- 7.434. TCP or Full Open Scan and Half Open Scan2 Minutes
- 7.535. Idle Scan2 Minutes
- 7.636. ACK and FIN Scan1 Minute
- 7.737. NULL and XMAS Scan2 Minutes
- 7.838. Targeting the Operating System and Host Names1 Minute
- 7.939. Active OS Fingerprinting1 Minute
- 7.1040. Passive OS fingerprinting1 Minute
- 7.1141. SMB Versioning1 Minute
- 7.12Quiz 14: System Based Information Gathering1 Question
- Section 8: The Essential Contents of Hacker’s Toolkit6