Ethical Hacking: Footprinting and Reconnaissance
Gain essential ethical hacking skills by mastering reconnaissance, scanning, and enumeration techniques. Learn how to gather intelligence, scan systems, and uncover vulnerabilities using tools like Nmap, Zenmap, and Maltego, all in a beginner-friendly, hands-on format.

What Youβll Learn
This Ethical Hacking: Footprinting and Reconnaissance will teach you:
- Zenmap GUI: Visualize scan results for easier analysis.
- Port scanning: Identify open ports and exposed services with Nmap.
- Maltego mastery: Analyze relationships and map data visually.
- Advanced scanning: Use Nmap scripts to detect deeper vulnerabilities.
- Information gathering tools: Use Maltego and advanced techniques to collect insights.
- Reconnaissance fundamentals: Understand what data ethical hackers seek.
- Enumeration: Probe systems for detailed user, host, and service information.
Included in the Ethical Hacking: Footprinting and Reconnaissance
Suitable for the Following Careers
Course Content
Section 1: Reconnaissance
Section 2: Maltego
Section 3: Scanning
Audio Version of Training
OPEN FULL CURRICULUM
Requirements
Description of Ethical Hacking: Footprinting and Reconnaissance Training
This course introduces you to one of the most critical phases of ethical hacking: reconnaissance. You'll learn how attackers gather information to build an attack strategyβand how ethical hackers use those same techniques to assess risk and strengthen defenses. You'll explore tools like Maltego to uncover hidden relationships, and Nmap and Zenmap for scanning and enumeration.
Each lesson combines theory with hands-on practice so you can confidently conduct open-source intelligence (OSINT), map targets, scan for ports and services, and enumerate critical system data.
- Understand how gathering information reveals weaknesses in a target organization
- Use Maltego to map entities, infrastructure, and social media platforms
- Scan networks to identify open ports, services, and operating system details
- Run Nmap scripts to uncover misconfigurations and sensitive information
- Visualize scan results in Zenmap to assess the security posture clearly
- Perform enumeration using search engines and tools to extract deeper system data
By completing this course, youβll be able to identify vulnerabilities through port scanning, uncover OS and location information, and collect valuable information like contact details and devices connected to a network. Youβll also understand how social engineering fits into reconnaissance and how security professionals use data gathered to perform a vulnerability assessment, recommend security measures, and compile a detailed report.
Who Is This Course For
This course is perfect for beginners exploring cyber security, aspiring ethical hackers, and anyone preparing for CEH or penetration testing certifications. Itβs also a great fit for IT pros seeking to strengthen their network assessment skills.
Course Instructor
Dr. Mohamed Atef is a distinguished Cybersecurity Consultant and Certified Instructor with over two decades of experience in orchestrating and overseeing impactful cybersecurity projects. His expertise spans various critical domains, including ISMS implementation, cybersecurity standards and compliance, Security Operation Centers, BCP/DRP, penetration testing, and enterprise technical solutions.
Dr. Atef has authored three books on cybersecurity and created 14 best-selling online courses. He is known for his engaging teaching style, which makes complex concepts accessible to learners of all levels. His certifications include CISSP, CEH, CEI, CISM, CISA, Security+, CCNP, CCSI, MCT, MCSE+ Security, MCITP, PMP, N+, RHCE, and Linux+.
His courses cover a wide range of topics, including preparation for CISSP, CCSP, CISM, ISO 27001, CISA, CRISC, CEH, GISF, and GSEC exams, ethical hacking and penetration testing, Android device hacking, network implementation, and Linux. Dr. Atefβs extensive knowledge and dedication to cybersecurity education make him a trusted and influential figure in the field.
Read More
Read Less
Testimonials
Ravi S.
Learning through this course gave me a clear view of how reconnaissance techniques fit into the broader footprinting process. The Maltego walkthroughs were excellent, and tools like Nmap and Zenmap helped me understand traceroute analysis and find potential attack vectors. It's a must for beginners looking to prevent a cyber attack and strengthen security policies.
Daniel K.
The lessons were concise, well-paced, and packed with useful information. I finally understand how hackers gather intelligence and scan systems before an attack. The balance between theory and hands-on exercises made it easy to follow.
TomΓ‘s G.
The course explains scanning and reconnaissance really well, and I learned a lot about tools like Nmap and Maltego. It helped me understand how to collect information through passive footprinting and gain insights into a target's infrastructure and potential entry points. I just wish there were more visual aids, but overall, a great intro to handling cyber security threats.
Show More
Show Less