Part 1:Information Gathering and Reconnaissance
In this part, you will get an overview of the hacking concepts and an introduction to the attacker process often referred to as the kill chain. In addition, we will also look at some of the defender’s first lines of defense, including vulnerability assessments and threat modeling.
This section has the following chapters:
- Chapter 1, Ethical Hacking Concepts
- Chapter 2, Footprinting and Reconnaissance
- Chapter 3, Scanning and Enumeration
- Chapter 4, Vulnerability Assessments and Threat Modeling