Foundations and Reconnaissance Techniques

Coursera Courses ↗ · Coursera

Open Course on Coursera

Free to audit · Opens on Coursera

Foundations and Reconnaissance Techniques

Coursera · Beginner ·🔐 Cybersecurity ·1mo ago
Updated in May 2025. This course now features Coursera Coach! A smarter way to learn with interactive, real-time conversations that help you test your knowledge, challenge assumptions, and deepen your understanding as you progress through the course. Embark on a comprehensive journey into penetration testing with this course. You’ll develop critical skills in identifying vulnerabilities and assessing network resiliency against attacks. Gain an in-depth understanding of reconnaissance techniques and learn how to gather vital information to secure networks effectively. The course begins with foundational concepts of penetration testing, covering essential legal, regulatory, and compliance considerations like GDPR and PCI-DSS. You’ll explore standards and methodologies such as NIST and MITRE ATT&CK, ensuring a strong grounding in industry best practices. Learn the importance of professionalism and integrity while preparing for engagements by defining clear scopes and adhering to ethical guidelines. In the second phase, dive deep into reconnaissance and scanning techniques. Master tools like DNS recon, host discovery, and vulnerability scanning to identify weak spots in both traditional and cloud environments. You’ll also explore advanced concepts like defense detection and evasion, learning how to bypass security measures effectively. The course culminates with a detailed look at using Nmap, the trusted tool for probing and analyzing network vulnerabilities. This course is ideal for aspiring cybersecurity professionals, IT auditors, or anyone aiming to strengthen their understanding of penetration testing. It’s designed for learners with basic networking knowledge and offers a structured progression from foundational to advanced topics.
Watch on Coursera ↗ (saves to browser)
Sign in to unlock AI tutor explanation · ⚡30

Related AI Lessons

Metamorphic Malware in 2026: Why Your EDR Is Already Losing the Arms Race
Metamorphic malware is outsmarting traditional EDR systems, requiring new approaches to cybersecurity
Medium · AI
Metamorphic Malware in 2026: Why Your EDR Is Already Losing the Arms Race
Metamorphic malware is evolving to evade detection, making traditional EDR solutions ineffective, and requiring new approaches to cybersecurity
Medium · Cybersecurity
Recruit TryHackMe walkthrough
Learn to solve the Recruit TryHackMe challenge by applying SQL Injection, Local File Inclusion, and web enumeration techniques
Medium · Cybersecurity
Five Attacks in One Month: The Fake Recruiter Campaign Targeting Blockchain Developers
Learn about the fake recruiter campaign targeting blockchain developers and how to protect yourself from similar attacks
Medium · JavaScript
Up next
HOW CISA leaked public passwords
David Bombal
Watch →