Pearson
Certified Ethical Hacker (CEH): Unit 2
Pearson

Certified Ethical Hacker (CEH): Unit 2

Pearson

Instructor: Pearson

Included with Coursera Plus

Gain insight into a topic and learn the fundamentals.
Intermediate level

Recommended experience

4 hours to complete
Flexible schedule
Learn at your own pace
Gain insight into a topic and learn the fundamentals.
Intermediate level

Recommended experience

4 hours to complete
Flexible schedule
Learn at your own pace

What you'll learn

  • Master footprinting methodologies and Open Source Intelligence (OSINT) techniques.

  • Conduct comprehensive network scanning to identify live hosts and open ports.

  • Utilize advanced tools for effective reconnaissance and information gathering.

  • Develop skills in enumeration to extract detailed target system information.

Details to know

Shareable certificate

Add to your LinkedIn profile

Recently updated!

July 2025

Assessments

3 assignments

Taught in English

See how employees at top companies are mastering in-demand skills

 logos of Petrobras, TATA, Danone, Capgemini, P&G and L'Oreal

Build your subject-matter expertise

This course is part of the Certified Ethical Hacker (CEH) Specialization
When you enroll in this course, you'll also be enrolled in this Specialization.
  • Learn new concepts from industry experts
  • Gain a foundational understanding of a subject or tool
  • Develop job-relevant skills with hands-on projects
  • Earn a shareable career certificate

There is 1 module in this course

In this module, you'll explore three different techniques that form the foundation of effective reconnaissance. First, focus on footprinting and reconnaissance, which involve gathering as much information as possible about your target system, ensuring you have permission from the organization. You'll learn how to collect and analyze data from various sources, both passive and active, to build a comprehensive profile of your target. Next, you'll delve into scanning networks, where you actively probe the target system, mapping its structure and identifying live hosts, open ports, and the services running on them. Finally, you'll explore enumeration, a more focused form of information gathering, where you dig deeper into the systems identified in the previous phase, extracting usernames, machine names, network resources, shares, and other services. Enumeration helps you understand the finer details of your target, setting the stage for potential exploitation.

What's included

34 videos3 assignments

Earn a career certificate

Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.

Instructor

Pearson
Pearson
146 Courses63 learners

Offered by

Pearson

Why people choose Coursera for their career

Felipe M.
Learner since 2018
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."
Jennifer J.
Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."
Larry W.
Learner since 2021
"When I need courses on topics that my university doesn't offer, Coursera is one of the best places to go."
Chaitanya A.
"Learning isn't just about being better at your job: it's so much more than that. Coursera allows me to learn without limits."
Coursera Plus

Open new doors with Coursera Plus

Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription

Advance your career with an online degree

Earn a degree from world-class universities - 100% online

Join over 3,400 global companies that choose Coursera for Business

Upskill your employees to excel in the digital economy

Frequently asked questions