Introduction to Ethical Hacking and Recon Techniques

This course is part of Certified Ethical Hacker (CEH) v.12 Specialization

Instructor: Packt - Course Instructors

What you'll learn

  •   Master essential reconnaissance techniques like footprinting, DNS recon, and sub-domain enumeration.
  •   Explore scanning strategies including TCP, Stealth, and ACK scans with nmap.
  •   Analyze adversarial behaviors using the MITRE ATT&CK framework and threat intelligence.
  •   Employ social engineering and OSINT tools to uncover vulnerabilities ethically.
  • Skills you'll gain

  •   Data Ethics
  •   Penetration Testing
  •   Network Analysis
  •   TCP/IP
  •   Cyber Risk
  •   Cyber Threat Intelligence
  •   Vulnerability Assessments
  •   Risk Management Framework
  •   Threat Detection
  •   Cyber Attacks
  •   Threat Modeling
  •   Network Security
  •   Cybersecurity
  •   Vulnerability Scanning
  •   Cyber Threat Hunting
  •   MITRE ATT&CK Framework
  • There are 3 modules in this course

    The course begins with foundational knowledge, including attacker motivations, cyber kill chains, and standards like the MITRE ATT&CK Framework. Next, you’ll explore advanced reconnaissance methods, from footprinting to social engineering recon and network scanning. Along the way, you’ll gain hands-on expertise in tools like nmap and techniques for stealthy scans, all while adhering to industry regulations and ethical guidelines. As the course progresses, you’ll master recon techniques such as Google Dorks, Shodan searches, and the use of the Diamond Model of Intrusion Analysis. You’ll also learn to analyze attack behaviors, apply threat intelligence, and model risks effectively to stay ahead of malicious actors. This course is perfect for aspiring ethical hackers, cybersecurity professionals, and IT enthusiasts eager to understand the offensive strategies that strengthen defensive security. No prior experience is necessary, making it accessible to beginners, but technical familiarity will be an asset for more advanced topics.

    Recon Techniques - Footprinting and Recon

    Recon Techniques - Scanning

    Explore more from Security

    ©2025  ementorhub.com. All rights reserved