Hello Great Learner 😊!
Welcome to this new CEH handwritten notes from my Notes-Bucket. Yes, here you can download free cyber security notes for free. You can have handwritten written CEH notes here. The second unit in CEH v12 is 'Footprinting and Reconnaissance', and I made this in handwritten, these notes are just one click away from you now.
Click here to Download👇
CEH Module 2 Handwritten Notes
I hope you have downloaded the notes and found these well. So now I am telling here what is in these notes and what I have covered. I covered important and frequently asked topics. So, most of the headings are important and widely used tools and techniques for recon.
Here are the major heading that is covered in Module 2
- Footprinting Concepts
- Passive Footprinting
- Active Footprinting
- Information obtained in Footprinting
- Footprinting Threats
- Footprinting through Search Engines
- Footprinting through Web Searches
- Footprinting through Social Networking
- Website Footprinting
- Email Footprinting
- Whois Footprinting
- DNS Footprinting
- Network Footprinting
- Footprinting through Social Engineering
Tools and Techniques
Technique/Tool | Description |
---|---|
Advanced Google Searching |
|
Google Hacking Database |
|
Advanced Image Search |
|
Reverse Image Search |
|
Video Search Engines |
|
Meta Search Engine |
|
FTP Search Engine |
|
IoT Search Engine |
|
Meta Search Engine |
|
FTP |
|
TLDs and Subdomains |
|
People search |
|
Information from LinkedIn |
|
Harvesting email lists |
|
Job Sites |
|
Deep and Dark web footprinting |
|
Determining Operating System (OS) |
|
VoIP and VPN |
|
Competitve Intelligence Gathering |
|
How are these notes helpful?
These notes are very helpful but everyone should remind themselves that they should make their handwritten notes because if you prepare and make notes then it will help to revise efficiently. The reason is your handwriting and the previous memory help to catch the points easily, it just recalls what your mind saved in the memory. It is my suggestion to everyone if you have enough time or you can then you should make your own written notes for every important you are studying because it will help you to revise every important thing during exams and interviews.
If you download these notes you will find that are crisp and concise, I prepared them as short as I could. When you go through these notes you will find every important topic, tool and technique is there. Everything is written in heading and points format, which means all the headings are independent to be studied, you can go to any page or any point thing is separate from each other.
If you are looking for other notes like other CEH modules or other tech topics then you could follow this blog, I will share other CEH Module Handwritten Notes one by one. You can check out other notes like Automata, C Programming Language, Database management system, Cyber Security, Operating System etc. You can check out these in Labels and Archives.
Lastly here is a short and important disclaimer- These notes are written by me so if you want to share them with others you can share these notes but alteration is not permitted. It may have some grammatical errors so please take care while referring to anything from it. You should cross-check while referring. It may also have a typo or spelling mirror for the tool name, some tools mentioned here will only be found on their particular websites, please check.
Conclusion
Thank you for diving into the enriching world of cybersecurity with our CEH Module 2 Handwritten Notes. We believe in empowering individuals like you with accessible and comprehensive resources. Our notes cover the vital aspects of 'Footprinting and Reconnaissance' in CEH v12, ensuring that you grasp the fundamental concepts, tools, and techniques. By downloading these notes, you've equipped yourself with a concise yet thorough overview of essential topics, ranging from passive and active footprinting to social engineering. The organized format, with independent headings and points, allows for easy navigation and focused learning. While our notes serve as a valuable reference, we encourage you to create your handwritten notes. The act of jotting down information aids memory retention, enhancing your ability to recall crucial details during exams and interviews.
Looking ahead, we are committed to sharing more CEH Module Handwritten Notes and exploring diverse tech topics. Stay tuned for updates on Automata, C Programming Language, Database Management System, Cyber Security, Operating System, and more. Please remember, that these notes are a product of dedication, and while sharing is encouraged, any alterations are not permitted. We acknowledge the possibility of minor errors, and we recommend cross-checking information for accuracy. Happy learning, and let the pursuit of knowledge fuel your journey in the fascinating realm of cybersecurity!