What Does MVP Stand For? It’s Not What You Think.
October 7, 2024
Article
This course is part of Certified Ethical Hacker (CEH) v.12 Specialization
Instructor: Packt - Course Instructors
Included with
Recommended experience
Intermediate level
This course is ideal for cybersecurity enthusiasts, IT professionals, and ethical hacking aspirants. A basic understanding of networking is helpful.
Recommended experience
Intermediate level
This course is ideal for cybersecurity enthusiasts, IT professionals, and ethical hacking aspirants. A basic understanding of networking is helpful.
Master essential reconnaissance techniques like footprinting, DNS recon, and sub-domain enumeration.
Explore scanning strategies including TCP, Stealth, and ACK scans with nmap.
Analyze adversarial behaviors using the MITRE ATT&CK framework and threat intelligence.
Employ social engineering and OSINT tools to uncover vulnerabilities ethically.
Add to your LinkedIn profile
February 2025
4 assignments
Add this credential to your LinkedIn profile, resume, or CV
Share it on social media and in your performance review
Unlock the essentials of ethical hacking with this comprehensive course designed to equip you with the tools and techniques to safeguard modern systems. You’ll delve into the core principles of cybersecurity, understand the motives behind cyberattacks, and learn the frameworks used by professionals to predict and counteract threats effectively.
The course begins with foundational knowledge, including attacker motivations, cyber kill chains, and standards like the MITRE ATT&CK Framework. Next, you’ll explore advanced reconnaissance methods, from footprinting to social engineering recon and network scanning. Along the way, you’ll gain hands-on expertise in tools like nmap and techniques for stealthy scans, all while adhering to industry regulations and ethical guidelines. As the course progresses, you’ll master recon techniques such as Google Dorks, Shodan searches, and the use of the Diamond Model of Intrusion Analysis. You’ll also learn to analyze attack behaviors, apply threat intelligence, and model risks effectively to stay ahead of malicious actors. This course is perfect for aspiring ethical hackers, cybersecurity professionals, and IT enthusiasts eager to understand the offensive strategies that strengthen defensive security. No prior experience is necessary, making it accessible to beginners, but technical familiarity will be an asset for more advanced topics.
In this module, we will introduce the fundamental principles of ethical hacking and cybersecurity. You will gain a foundational understanding of the motives behind cyberattacks, explore the classifications of threats, and delve into critical concepts like the Cyber Kill Chain, MITRE ATT&CK Framework, and Incident Management. This comprehensive introduction sets the stage for the practical skills needed to become an effective ethical hacker.
18 videos2 readings1 assignment
In this module, we will explore the strategies and tools used in the initial stages of an ethical hacking operation. From footprinting basics to advanced techniques like sub-domain enumeration, social networking reconnaissance, and deep web exploration, you'll learn how attackers gather critical intelligence. We’ll also discuss effective countermeasures to secure systems against these efforts.
12 videos1 assignment
In this module, we will focus on scanning techniques that build upon reconnaissance efforts to identify vulnerabilities and access points. You’ll learn about network scanning tools and methodologies, such as stealth scans, ACK scans, and OS identification. With a focus on efficiency and evasion tactics, this module equips you with the skills to navigate advanced security controls and strengthen your penetration testing abilities.
14 videos1 reading2 assignments
Packt helps tech professionals put software to work by distilling and sharing the working knowledge of their peers. Packt is an established global technical learning content provider, founded in Birmingham, UK, with over twenty years of experience delivering premium, rich content from groundbreaking authors on a wide range of emerging and popular technologies.
Johns Hopkins University
Specialization
LearnKartS
Course
Course
Johns Hopkins University
Course
Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription
Earn a degree from world-class universities - 100% online
Upskill your employees to excel in the digital economy
Yes, you can preview the first video and view the syllabus before you enroll. You must purchase the course to access content not included in the preview.
If you decide to enroll in the course before the session start date, you will have access to all of the lecture videos and readings for the course. You’ll be able to submit assignments once the session starts.
Once you enroll and your session begins, you will have access to all videos and other resources, including reading items and the course discussion forum. You’ll be able to view and submit practice assessments, and complete required graded assignments to earn a grade and a Course Certificate.
If you complete the course successfully, your electronic Course Certificate will be added to your Accomplishments page - from there, you can print your Course Certificate or add it to your LinkedIn profile.
This course is one of a few offered on Coursera that are currently available only to learners who have paid or received financial aid, when available.
If you subscribed, you get a 7-day free trial during which you can cancel at no penalty. After that, we don’t give refunds, but you can cancel your subscription at any time. See our full refund policy.
Yes. In select learning programs, you can apply for financial aid or a scholarship if you can’t afford the enrollment fee. If fin aid or scholarship is available for your learning program selection, you’ll find a link to apply on the description page.
These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work.
These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.
These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance.
These cookies enable the website to provide enhanced functionality and personalization. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly.