Cybersecurity

Google Dorking & Shodan for Ethical Hackers

This beginner to intermediate course provides a comprehensive introduction to Google Dorking and Shodan for ethical hacking reconnaissance. Participants will learn to identify internet-connected devices, exposed systems, sensitive data, and vulnerabilities using advanced search techniques.  Students will gain hands-on experience using these tools to conduct reconnaissance on IoT devices and Industrial Control Systems (ICS), identifying potential security risks in critical infrastructure. The course also covers defensive strategies to protect sensitive information from hacker scans. Combining theory with hands-on practice, it equips learners with practical cybersecurity skills.

Content
  • Reconnaissance of internet-connected devices using SHODAN
  • Gathering sensitive data using Google Hacking (Google Dorking)
  • Defensive strategies to prevent hackers from obtaining information through scanning 
Learning Outcomes
  • Describe the different phases of ethical hacking and their significance in cybersecurity
  • Explain the key features of Shodan, its role as a search engine for internet-connected devices, and perform passive reconnaissance using Shodan
  • Execute essential Shodan CLI commands to collect information about devices, services
  • Analyze misconfigured IoT devices and Industrial Control Systems (ICS) to identify potential security risks
  • Demonstrate the use of Google Dorking (Google Hacking) to uncover sensitive information and assess cybersecurity risks
  • Evaluate and implement defensive strategies to prevent hackers from obtaining information through scanning

Training Method

We use PowerPoint slides to teach the theoretical concepts of passive scanning while also providing hands-on experience. This combination enables students to not only understand the theory but also apply it in real-world scenarios.

Organised By
Digital Learning Hub Luxembourg
Digital Learning Hub Luxembourg
Certification
Participation Only
Prerequisites
  • Knowledge of operating systems, understanding of OSI model, and familiarity with key network protocols such as IP, TCP, UDP, and ICMP
  • Familiarity with IP addresses and ports in computer networks
  • Interest in analyzing network protocols in depth

Planning and location
Session 1
10/06/2025 - Tuesday
17:30 - 20:30
Session 2
17/06/2025 - Tuesday
17:30 - 20:30
Session 3
24/06/2025 - Tuesday
17:30 - 20:30
Available Edition(s):

https://www.dlh.lu/web/image/product.template/1776/image_1920?unique=ef59a47

This combination does not exist.

36.00 € 36.0 EUR 36.00 €

36.00 €

Not Available For Sale

Your trainer(s) for this course
Amirhossein ADAVOUDI