Target Identification and Application Mapping
Take a closer look at target identification and application mapping with this course covering service identification, core defense mechanisms and more. Includes vocabulary and tools.
Never go in without a plan. Get to grips with target identification and application mapping through this course covering passive intelligence gathering, service identification, how servers and apps communicate, core defense mechanisms, Burp Suite and more. What is open-source intelligence? What’s the difference between first- and third-party sources? What’s the first step of attacking a web application? Get the dirt on getting intelligence.
Passive Intelligence GatheringDuration: 9:45
Service IdentificationDuration: 5:06
How Servers and Apps CommunicateDuration: 10:54
Core Defense MechanismsDuration: 11:41
Mapping ApplicationsDuration: 11:11
Meet the author
At Infosec, we believe knowledge is the most powerful tool in the fight against cybercrime. We help IT and security professionals advance their careers with a full regimen of certification and skills training. We also empower all employees with security awareness training to stay cybersecure at work and home. Driven by smart people wanting to do good, Infosec educates entire organizations on how to defend themselves from cybercrime. That’s what we do every day — equipping everyone with the latest security skills so the good guys win.
You're in good company
"Comparing Infosec to other vendors is like comparing apples to oranges. My instructor was hands-down the best I’ve had."
"I knew Infosec could tell me what to expect on the exam and what topics to focus on most."
"I’ve taken five boot camps with Infosec and all my instructors have been great."