Tags
Language
Tags
July 2025
Su Mo Tu We Th Fr Sa
29 30 1 2 3 4 5
6 7 8 9 10 11 12
13 14 15 16 17 18 19
20 21 22 23 24 25 26
27 28 29 30 31 1 2
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Information Gathering - Phase 1 of Cyber Security

    Posted By: ELK1nG
    Information Gathering - Phase 1 of Cyber Security

    Information Gathering - Phase 1 of Cyber Security
    MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
    Language: English | Size: 3.49 GB | Duration: 4h 33m

    Understanding Reconnaissance and Information Gathering Phase in Cyber Security




    What you'll learn
    Reconnaissance and Information Gathering
    Requirements
    Basic of Knowledge of Computer systems and keen to learn Infosec domain
    Description
    This course talks about the very initial phase of Cyber Security concept which is information gathering as is a integral part of Ethical Hacking. This also helps the Cyber security professionals and companies to assess their security posture in the real world scenario so that they can understand the information that is exposed to the outside world. This helps them to protect the information in the Cyber world so that they do not fall prey to Cyber Security breaches(which is a biggest threat in the internet paradigm). It covers all the aspects of information gathering in various verticals and also talks about the vectors to collect such information in a real world. It shows the real world examples with demonstration so better understand the topic in hand. One do not need a specialized knowledge in the Cyber security field to understand the course. However it is equally worth mentioning that one needs to have a bit of understanding in this area of IT systems and interest in the IT security domain so that it gives you a smooth understanding of the topic. The course is divided multiple sections with theoretical understanding followed by demonstration against the real systems. I am sure that the student will find this course useful and helpful in their job profiles in the said domain.

    Who this course is for:
    Beginners interested in Cyber Security