25.9.12
This website uses cookies to ensure you get the best experience on our website. Learn more

Maltego Teeth Resurrected: Reconnaissance, Exploitation, and Visual Pattern Recognition for the Ethical Hacker

Jonathan Douglas

It is common practice for pentesters and threat analysts to mimic the techniques used by real attackers and try to break defenses and find security flaws before actual attackers get the opportunity. In addition, you support mitigating these vulnerabilities and keep an eye on internal network defenses to spot cyber threats at an early stage. These tasks require a deep understandingof how attackers operate and where threats reside. Network monitoring and scanning tools, such as nmap, Metasploit and Wireshark, are mainstays of the network security industry, and knowing how to use them and integrate them into reconnaissance workflows is key to achieving success.In this course, where we combine tool training with a hands-on lab in a live environment and will teach you how to complement the command line tools that you already use. We will show you the power of being able to automate these tasks and visualize your data in an intuitive link analysis software tool.

Skills / Knowledge

  • PenTesting
  • Forensics

Issued on

August 1, 2021

Expires on

Does not expire