Ethical hackers will look for vulnerabilities. They will have to scout for information, take the leads form the information, and try to get more information on the network, security, operating system, software used, respective versions, etc. Footprinting is the process of collecting information about a target network and its environment. In our course, Footprinting, you will be learning about the 7 steps to information gathering, the footprinting hierarchy, and footprinting methodology, as well as the pros and cons of both passive and active footprinting. Google can be used for hacking. Learn the various tools, steps, and components that are used when hacking with Google. Learn the different tools and techniques used for footprinting both active and passive. We will conclude this course by going over various steps to countermeasure footprinting, as well as steps used in footprinting pentesting. View various demos demonstrating several of the tools that are talked about in this course.