Footprinting and Reconnaissance- (Ethical Hacking)

1 ) Chapter : Introduction to Ethical Hacking


1.1) What is Ethical Hacking?

 

1.2) Types of Hackers:- White Hat, Black Hat, Grey Hat

 

1.3) Ethical Hacking vs Malicious Hacking

 

1.4) Scope and Need of Ethical Hacking

 

1.5) Legal Framework and Cyber Laws

 

1.6) Phases of Ethical Hacking:- Reconnaissance, Scanning, Gaining Access, Maintaining Access, Clearing Tracks

 

Chapter 2: Footprinting and Reconnaissance


2.1 Passive vs Active Reconnaissance

 

2.2 Tools: Whois, Nslookup, Shodan, Maltego

 

2.3 Social Engineering Fundamentals

 

2.4 Email, Website, and DNS Footprinting

 

2.5 Detecting Reconnaissance Activities