Search
Log in
  • Home

  • Categories

  • Audiobooks

  • E-books

  • Magazines

  • For kids

  • Top lists

  • Help

  • Download app

  • Use campaign code

  • Redeem gift card

  • Try free now
  • Log in
  • Language

    🇧🇪 Belgique

    • FR
    • EN

    🇩🇰 Danmark

    • DK
    • EN

    🇩🇪 Deutschland

    • DE
    • EN

    🇪🇸 España

    • ES
    • EN

    🇫🇷 France

    • FR
    • EN

    🇳🇱 Nederland

    • NL
    • EN

    🇳🇴 Norge

    • NO
    • EN

    🇦🇹 Österreich

    • AT
    • EN

    🇨🇭 Schweiz

    • DE
    • EN

    🇫🇮 Suomi

    • FI
    • EN

    🇸🇪 Sverige

    • SE
    • EN
  1. Books
  2. Nonfiction
  3. Computer sciences

Read and listen for free for 30 days!

Cancel anytime

Try free now
0.0(0)

Reconnaissance for Ethical Hackers

This book explores reconnaissance techniques – the first step in discovering security vulnerabilities and exposed network infrastructure. It aids ethical hackers in understanding adversaries’ methods of identifying and mapping attack surfaces, such as network entry points, which enables them to exploit the target and steal confidential information.

Reconnaissance for Ethical Hackers helps you get a comprehensive understanding of how threat actors are able to successfully leverage the information collected during the reconnaissance phase to scan and enumerate the network, collect information, and pose various security threats. This book helps you stay one step ahead in knowing how adversaries use tactics, techniques, and procedures (TTPs) to successfully gain information about their targets, while you develop a solid foundation on information gathering strategies as a cybersecurity professional. The concluding chapters will assist you in developing the skills and techniques used by real adversaries to identify vulnerable points of entry into an organization and mitigate reconnaissance-based attacks.

By the end of this book, you’ll have gained a solid understanding of reconnaissance, as well as learned how to secure yourself and your organization without causing significant disruption.


Author:

  • Glen D. Singh

Format:

  • E-book

Duration:

  • 326 pages

Language:

English

Categories:

  • Nonfiction
  • Computer sciences

More by Glen D. Singh

Skip the list
  1. The Ultimate Kali Linux Book : Harness Nmap, Metaspolit, Aircrack-ng, and Empire for cutting-edge pentesting

    Glen D. Singh

    book
  2. CompTIA Network+ N10-008 Certification Guide

    Glen D. Singh

    book
  3. The Ultimate Kali Linux Book

    Glen D. Singh

    book
  4. Cisco Certified CyberOps Associate 200-201 Certification Guide

    Glen D. Singh

    book
  5. Implementing and Administering Cisco Solutions: 200-301 CCNA Exam Guide

    Glen D. Singh

    book
  6. Learn Kali Linux 2019

    Glen D. Singh

    book
  7. CompTIA Network+ Certification Guide

    Glen D. Singh, Rishi Latchmepersad

    book
  8. CCNA Security 210-260 Certification Guide

    Glen D. Singh, Michael Vinod, Vijay Anandh

    book

Help and contact


About us

  • Our story
  • Career
  • Press
  • Accessibility
  • Nextory One
  • Partner with us
  • Investor relations
  • Instagram
  • Facebook

Explore

  • Categories
  • Audiobooks
  • E-books
  • Magazines
  • For kids
  • Top lists

Popular categories

  • Crime
  • Biographies and reportage
  • Fiction
  • Feel-good and romance
  • Personal development
  • Children's books
  • True stories
  • Sleep and relaxation

Nextory

Copyright © 2025 Nextory AB

Privacy Policy · Terms ·
Excellent4.3 out of 5