A discussion of Phase 1 of the Attacker’s Methodology: Reconnaissance. Coverage includes the tools required to conduct reconnaissance on the organization, their staff, and their network using open-source tools (Kali Linux, Discover, Maltego, Central-Ops.net, and more).
Visit https://www.JasonDion.com for more certification exam prep courses.