Foundations and Reconnaissance Techniques

This course is part of CompTIA PenTest+ (PT0-002) Specialization

Instructor: Packt - Course Instructors

What you'll learn

  •   Analyze legal and compliance requirements for ethical penetration testing.
  •   Conduct effective reconnaissance using advanced tools and techniques.
  •   Implement industry-standard methodologies like MITRE ATT&CK and PTES.
  •   Bypass security defenses and assess vulnerabilities in cloud environments.
  • Skills you'll gain

  •   Threat Detection
  •   Payment Card Industry (PCI) Data Security Standards
  •   MITRE ATT&CK Framework
  •   Cyber Security Assessment
  •   Penetration Testing
  •   General Data Protection Regulation (GDPR)
  •   Infrastructure Security
  •   NIST 800-53
  •   Cybersecurity
  •   Network Analysis
  •   Vulnerability Assessments
  •   Vulnerability Scanning
  • There are 2 modules in this course

    This course now features Coursera Coach! A smarter way to learn with interactive, real-time conversations that help you test your knowledge, challenge assumptions, and deepen your understanding as you progress through the course. Embark on a comprehensive journey into penetration testing with this course. You’ll develop critical skills in identifying vulnerabilities and assessing network resiliency against attacks. Gain an in-depth understanding of reconnaissance techniques and learn how to gather vital information to secure networks effectively. The course begins with foundational concepts of penetration testing, covering essential legal, regulatory, and compliance considerations like GDPR and PCI-DSS. You’ll explore standards and methodologies such as NIST and MITRE ATT&CK, ensuring a strong grounding in industry best practices. Learn the importance of professionalism and integrity while preparing for engagements by defining clear scopes and adhering to ethical guidelines. In the second phase, dive deep into reconnaissance and scanning techniques. Master tools like DNS recon, host discovery, and vulnerability scanning to identify weak spots in both traditional and cloud environments. You’ll also explore advanced concepts like defense detection and evasion, learning how to bypass security measures effectively. The course culminates with a detailed look at using Nmap, the trusted tool for probing and analyzing network vulnerabilities. This course is ideal for aspiring cybersecurity professionals, IT auditors, or anyone aiming to strengthen their understanding of penetration testing. It’s designed for learners with basic networking knowledge and offers a structured progression from foundational to advanced topics.

    Reconnaissance and Scanning Techniques

    Explore more from Security

    ©2025  ementorhub.com. All rights reserved