Introduction to Ethical Hacking and Recon Techniques
This course is part of Certified Ethical Hacker (CEH) v.12 Specialization
Instructor: Packt - Course Instructors
What you'll learn
Skills you'll gain
There are 3 modules in this course
The course begins with foundational knowledge, including attacker motivations, cyber kill chains, and standards like the MITRE ATT&CK Framework. Next, you’ll explore advanced reconnaissance methods, from footprinting to social engineering recon and network scanning. Along the way, you’ll gain hands-on expertise in tools like nmap and techniques for stealthy scans, all while adhering to industry regulations and ethical guidelines. As the course progresses, you’ll master recon techniques such as Google Dorks, Shodan searches, and the use of the Diamond Model of Intrusion Analysis. You’ll also learn to analyze attack behaviors, apply threat intelligence, and model risks effectively to stay ahead of malicious actors. This course is perfect for aspiring ethical hackers, cybersecurity professionals, and IT enthusiasts eager to understand the offensive strategies that strengthen defensive security. No prior experience is necessary, making it accessible to beginners, but technical familiarity will be an asset for more advanced topics.
Recon Techniques - Footprinting and Recon
Recon Techniques - Scanning
Explore more from Security
©2025 ementorhub.com. All rights reserved