Featured resource
2025 Tech Upskilling Playbook
Tech Upskilling Playbook

Build future-ready tech teams and hit key business milestones with seven proven plays from industry leaders.

Check it out
  • Course
    • Libraries: If you want this course, consider one of these libraries.
    • Security

Network and Service Enumeration with Shodan

Learn how adversaries gather intelligence during the Reconnaissance stage. This course will teach you to use Shodan and recon-ng to identify exposed services, misconfigurations, and potential entry points.

Corey Thompson - Pluralsight course - Network and Service Enumeration with Shodan
Corey Thompson
What you'll learn

Cybersecurity professionals often lack structured methods to map an attacker’s view of exposed networks and services. In this course, Network and Service Enumeration with Shodan, you’ll learn to identify exposed services, host information, and potential entry points. First, you’ll explore passive network discovery using Shodan. Next, you’ll discover how to automate reconnaissance with recon-ng and the Shodan API. Finally, you’ll learn how to analyze host information and misconfigurations for triage and mitigation. When you’re finished with this course, you’ll have the skills and knowledge of MITRE ATT&CK reconnaissance techniques needed to identify exposed services, host information, and potential entry points.

Table of contents

About the author
Corey Thompson - Pluralsight course - Network and Service Enumeration with Shodan
Corey Thompson

Corey is a cybersecurity expert with years of experience. He specializes in threat analysis and red teaming, helping organizations identify vulnerabilities through simulated attacks.

Get access now

Sign up to get immediate access to this course plus thousands more you can watch anytime, anywhere.

Get started with Pluralsight