Advent of Cyber 2025

Daily festive challenges and 30% off annual subscriptions

29days
:
08hr
:
00min
:
54sec
Subscribe now
Back to all modules

Information Gathering and Vulnerability Scanning

Information Gathering and Vulnerability Scanning icon

Explore passive and active reconnaissance, and discover how to use Nmap to collect information about your targets efficiently.

This module explores the tools used for passive reconnaissance, i.e., collecting information without engaging with the target. Then it introduces various essential tools used in active reconnaissance. Finally, it explores Nmap usage in detail: discovering live hosts, conducting basic port scans, and conducting advanced port scans.

Information Gathering and Vulnerability Scanning icon

We use cookies to ensure you get the best user experience. For more information contact us.

Read more