Finance Certifications Goldman Sachs & Amazon Teams Trust
Python, Prompt Engineering, Data Science — Build the Skills Employers Want Now
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Dive into a comprehensive 3-hour video tutorial on ethical hacking, focusing on the five phases of hacking and passive Open Source Intelligence (OSINT) techniques. Learn about crucial OSINT tools and methodologies, including Hunter.io, breach-parse for password hunting, website and map reconnaissance, employee OSINT, Google Fu, theharvester, Have I Been Pwned?, Bluto, crt.sh, Wappalyzer, whatweb, and BuiltWith. Gain practical insights into passive reconnaissance and information gathering techniques essential for penetration testing and cybersecurity assessments. Conclude with an informative Q&A session to address specific queries and deepen your understanding of ethical hacking practices.
Syllabus
- Stream starts.
- Five Stages of Hacking.
- Passive Recon Introduction.
- Passive OSINT as a group.
- Hunter.io.
- Hunting for cleartext passwords / My custom tool "breach-parse".
- Website and map recon.
- Employee OSINT.
- Google Fu.
- theharvester.
- Have I Been Pwned?.
- Bluto.
- crt.sh.
- Wappalyzer.
- whatweb.
- BuiltWith.
- Starts.
Taught by
The Cyber Mentor