Course Curriculum

Before the course
(W00) Course Instructions 00:00:00
Module 1
(W40M01) DNS Enumeration 00:00:00
(W40M02) DNSSEC Analyzer & Passive Recon 00:00:00
(W40M03) ULRCrazy – Typosquatting attacks 00:00:00
(W40M04) URL Expanders 00:00:00
(W40M05) IP-Host-Hash automater 00:00:00
(W40M06) Harvesting email addresses 00:00:00
(W40M07) Email information gathering 00:00:00
(W40M08) Netcraft analytics 00:00:00
(W40M09) GHDB 00:00:00
(W40M10) Multiple web archives and cached data 00:00:00
(W40M11) Module 1 Exercise 1 – Harvesting Email Addresses 00:00:00
(W40A01) Module 1 Exercise 1 – Harvesting Email Addresses 30, 00:00
(W40M12) Module 1 Exercise 2 – Using Google Dorks 00:00:00
(W40A02) Module 1 Exercise 2 – Using Google Dorks 30, 00:00
(W40M13) Module 1 Exercise 3 – Search for cached data 00:00:00
(W40A03) Module 1 Exercise 3 – Search for cached data 30, 00:00
(W40M14) Module 1 Exercise 4 – Gather the DNS records of grayhat.in 00:00:00
(W40A04) Module 1 Exercise 4 – Gather the DNS records of grayhat.in 30, 00:00
(W40M15) Module 1 Exercise 5 – Automater for IP, URL, and hashes. 00:00:00
(W40A05) Module 1 Exercise 5 – Automater for IP, URL, and hashes. 30, 00:00
Module 2
(W40M16) FOCA – Metadata 00:00:00
(W40M17) Metagoofil 00:00:00
(W40M18) Opanda PowerEXIF- Metadata for image 00:00:00
(W40M19) EDGAR – Company Insights 00:00:00
(W40M20) Get database server used in a company with a job site 00:00:00
(W40M21) Peekyou and lullar – People search 00:00:00
(W40M22) Maltego-CE – finding links and details with investigation 00:00:00
(W40M23) Facebook OSINT 00:00:00
(W40M24) Twitter OSINT and twofi 00:00:00
(W40M25) Reddit, Tinder, eBay, Craigslist 00:00:00
(W40M26) Module 2 Exercise 1: Database/server from job posting site 00:00:00
(W40A06) Module 2 Exercise 1: Database/server from job posting site 30, 00:00
(W40M27) Module 2 Exercise 2: Information/Metadata about picture 00:00:00
(W40A07) Module 2 Exercise 2: Information/Metadata about picture 30, 00:00
(W40M28) Module 2 Exercise 3: Investigate the email using Maltego-CE 00:00:00
(W40A08) Module 2 Exercise 3: Investigate the email using Maltego-CE 30, 00:00
(W40M29) Module 2 Exercise 4: Extract data using FOCA 00:00:00
(W40A09) Module 2 Exercise 4: Extract data using FOCA 30, 00:00
(W40M30) Module 2 Exercise 5: Make wordlist using twoFI 00:00:00
(W40A10) Module 2 Exercise 5: Make wordlist using twoFI 30, 00:00
Module 3
(W40M31) Exploit DB and SearchSploit 00:00:00
(W40M32) Global terrorism database 00:00:00
(W40M33) Hunting criminal records 00:00:00
(W40M34) Default passwords databases and lists 00:00:00
(W40M35) Digging into Darknet 00:00:00
(W40M36) Data leaks hunt – WikiLeaks 00:00:00
(W40M37) Live air traffic database 00:00:00
(W40M38) Mapping the fence like the intruders 00:00:00
(W40M39) Vehicle records and databases 00:00:00
(W40M40) Wieless network mapping 00:00:00
(W40M41) Cell phone towers and live cameras 00:00:00
(W40M42) Government data and employee details 00:00:00
(W40M43) Module 3 Assignments Exercise 1 – Investigate leaked data 00:00:00
(W40A11) Module 3 Assignments Exercise 1 – Investigate leaked data 30, 00:00
(W40M44) Module 3 Assignments Exercise 2 – Get flight data 00:00:00
(W40A12) Module 3 Assignments Exercise 2 – Get flight data 30, 00:00
(W40M45) Module 3 Assignments Exercise 3 -Map the fence of a location 00:00:00
(W40A13) Module 3 Assignments Exercise 3 -Map the fence of a location 30, 00:00
(W40M46) Module 3 Assignments Exercise 4 – Find employees of an organization 00:00:00
(W40A14) Module 3 Assignments Exercise 4 – Find employees of an organization 30, 00:00
Module 4
(W40M47) Recon-ng – complete info data 00:00:00
(W40M48) Spiderfoot – Extracting information in a GUI 00:00:00
(W40M49) DiscoverScript – Multi-specialty hunter 00:00:00
(W40M50) Threat Intelligence 00:00:00
(W40M51) Shodan – Search engine for hackers 00:00:00
(W40M52) Mobile phone number details 00:00:00
(W40M53) Exploits and advisories 00:00:00
(W40M54) Bonus – Godfather of OSINT 00:00:00
(W40M55) Module 4 Exercise 1 – Search for vulnerable and outdated servers 00:00:00
(W40A15) Module 4 Exercise 1 – Search for vulnerable and outdated servers 30, 00:00
(W40M56) Module 4 Exercise 2 – Use Recon-ng on target site 00:00:00
(W40A16) Module 4 Exercise 2 – Use Recon-ng on target site 30, 00:00
(W40M57) Module 4 Exercise 3 – Run DiscoverScript over a website 00:00:00
(W40A17) Module 4 Exercise 3 – Run DiscoverScript over a website 30, 00:00
Final Exam
(W40Q01) Final Exam 00:20:00
TAKE THIS COURSE
  • $289.00
  • UNLIMITED ACCESS
  • Course Certificate
384 STUDENTS ENROLLED

Who’s Online

There are no users currently online

Certificate Code

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2013