1 00:00:00,196 --> 00:00:02,613 (soft tones) 2 00:00:07,490 --> 00:00:09,150 - Welcome to lesson three, 3 00:00:09,150 --> 00:00:12,780 Information Gathering and Vulnerability Identification. 4 00:00:12,780 --> 00:00:15,980 In this lesson, you will learn how to conduct 5 00:00:15,980 --> 00:00:19,000 information gathering and reconnaissance. 6 00:00:19,000 --> 00:00:20,562 You will learn how to perform 7 00:00:20,562 --> 00:00:23,130 and analyze vulnerability scans, 8 00:00:23,130 --> 00:00:25,800 and how to leverage reconnaissance results 9 00:00:25,800 --> 00:00:28,970 to prepare for the exploitation phase. 10 00:00:28,970 --> 00:00:31,160 In this lesson, you will also learn 11 00:00:31,160 --> 00:00:32,830 about the different weaknesses 12 00:00:32,830 --> 00:00:35,310 related to specialized systems. 13 00:00:35,310 --> 00:00:36,210 Let's get started.