Maltego Teeth Resurrected: Reconnaissance, Exploitation, and Visual Pattern Recognition for the Ethical Hacker
It is common practice for pentesters and threat analysts to mimic the techniques used by real attackers and try to break defenses and find security flaws before actual attackers get the opportunity. In addition, you support mitigating these vulnerabilities and keep an eye on internal network defenses to spot cyber threats at an early stage. These tasks require a deep understandingof how attackers operate and where threats reside. Network monitoring and scanning tools, such as nmap, Metasploit and Wireshark, are mainstays of the network security industry, and knowing how to use them and integrate them into reconnaissance workflows is key to achieving success.In this course, where we combine tool training with a hands-on lab in a live environment and will teach you how to complement the command line tools that you already use. We will show you the power of being able to automate these tasks and visualize your data in an intuitive link analysis software tool.
Skills / Knowledge
- PenTesting
- Forensics