Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
This course focuses on information gathering and vulnerability identification. You will explore the essential techniques of footprinting, scanning networks, and enumeration. Learn how to gather comprehensive data on target systems using both passive and active methods, and develop a keen understanding of network structures and live hosts. You'll explore the use of advanced tools like Shodan, Maltego, and Recon-NG, for extracting critical information such as usernames, machine names, and network resources. By the end of this course, you will be equipped with the skills to conduct thorough reconnaissance.