5910 Breckenridge Pkwy Suite B, Tampa, FL. 33610
(800) 272-0707

SkillSoft Explore Course

Certification     EC-Council     Certified Ethical Hacker (CEH)     Certified Ethical Hacker (CEH) v11

When you're looking for useful target information, you want to pull from every available source. In this course, you'll investigate how to gather and inspect metadata for possible sensitive info about a target. You'll learn how to use wordlists for fuzzing and password attacks, about the usefulness of custom wordlists, and how to generate a wordlist based off the target's web presence. Next, you'll examine how e-mail tracking systems can glean info like IP addresses, geolocation, and host operating systems. Finally, you'll learn about useful information that can be found using WHOIS and DNS service. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.



Objectives

CEH v11: Metadata, Wordlists, Email, WHOIS & DNS Recon

  • recognize tools used to extract metadata
  • recognize tools used to locate files on a website
  • identify the location of sample word list files in Kali Linux
  • identify the term used for files that contain common words and passwords
  • recognize tools that can be used to create custom word list files
  • recognize tools used for email tracking
  • identify the different types of whois models
  • identify tools used to perform whois searches
  • recognize commands used to enumerate DNS