This course covers scanning and enumeration techniques used to discover hosts, services, and vulnerabilities in systems or networks. Students will learn how to effectively use tools such as Nmap, Nessus, and others to perform scanning and enumeration.