Foundations and Reconnaissance Techniques

Coursera Courses ↗ · Coursera

Open Course on Coursera

Free to audit · Opens on Coursera

Foundations and Reconnaissance Techniques

Coursera · Beginner ·🔐 Cybersecurity ·1mo ago
Updated in May 2025. This course now features Coursera Coach! A smarter way to learn with interactive, real-time conversations that help you test your knowledge, challenge assumptions, and deepen your understanding as you progress through the course. Embark on a comprehensive journey into penetration testing with this course. You’ll develop critical skills in identifying vulnerabilities and assessing network resiliency against attacks. Gain an in-depth understanding of reconnaissance techniques and learn how to gather vital information to secure networks effectively. The course begins with foundational concepts of penetration testing, covering essential legal, regulatory, and compliance considerations like GDPR and PCI-DSS. You’ll explore standards and methodologies such as NIST and MITRE ATT&CK, ensuring a strong grounding in industry best practices. Learn the importance of professionalism and integrity while preparing for engagements by defining clear scopes and adhering to ethical guidelines. In the second phase, dive deep into reconnaissance and scanning techniques. Master tools like DNS recon, host discovery, and vulnerability scanning to identify weak spots in both traditional and cloud environments. You’ll also explore advanced concepts like defense detection and evasion, learning how to bypass security measures effectively. The course culminates with a detailed look at using Nmap, the trusted tool for probing and analyzing network vulnerabilities. This course is ideal for aspiring cybersecurity professionals, IT auditors, or anyone aiming to strengthen their understanding of penetration testing. It’s designed for learners with basic networking knowledge and offers a structured progression from foundational to advanced topics.
Watch on Coursera ↗ (saves to browser)
Sign in to unlock AI tutor explanation · ⚡30

Related AI Lessons

CVE-2026-41615 | Microsoft Authenticator Information Disclosure Vulnerability | R.A.H.S.I. Framework™ Analysis
Learn about the Microsoft Authenticator Information Disclosure Vulnerability and how to analyze it using the R.A.H.S.I. Framework
Dev.to AI
Twitter OSINT & Threat Intelligence: Toolkit for Ethical Hackers & Security Analysts
Use Twitter for OSINT and threat intelligence to enhance security posture ethically and effectively
Medium · Startup
Twitter OSINT & Threat Intelligence: Toolkit for Ethical Hackers & Security Analysts
Learn to leverage Twitter for OSINT and threat intelligence to strengthen security posture
Medium · Cybersecurity
Your Encrypted Laptop Isn’t as Safe as You Think
Encryption alone may not protect your laptop data from theft, understand the limitations and take additional measures
Medium · Cybersecurity
Up next
Cryptography
Coursera
Watch →