AI Foundations and Reconnaissance (Hacking with AI)
Published by Pearson
Using AI for Ethical Hacking, OSINT, and Reconnaissance Techniques
- Using AI for offensive security reconnaissance.
- Real-world and hands-on demos throughout.
- Expert insights to help jumpstart a modern ethical hacking career.
Reconnaissance is the first step in any penetration test or red team engagement. This intensive training session is taught by Omar Santos, a best-selling security author, speaker, and cybersecurity and AI expert. The training includes focused live discussions, real-world demos, and insights into hacking from someone who has been on the front lines. You will learn how to use AI for reconnaissance and information gathering, including passive reconnaissance, OSINT, and active techniques such as scanning, enumeration, and fuzzing. No prior penetration testing or ethical hacking experience is required.
You will be introduced to offensive cybersecurity concepts, gain hands-on experience by building your own hacking lab, and learn about the art of information gathering. This course is also helpful for those seeking certifications such as the Offensive Security Certified Professional (OSCP), CEH Practical, PenTest+, Cisco Certificate in Ethical Hacking, or the GIAC Penetration Tester (GPEN). You will learn how to use Claude Code, Cursor, Codex, Windsurf, Warp, and many other tools for offensive security, as well as Model Context Protocol (MCP) servers to interact with cybersecurity tools.
What you’ll learn and how you can apply it
- Gain hands-on experience with foundational ethical hacking and reconnaissance, starting with lab setup using WebSploit, Ludus, Kali Linux, and Parrot Security.
- Learn and apply passive reconnaissance and OSINT techniques to collect actionable intelligence on targets with the help of AI.
- Execute active reconnaissance, scanning, enumeration, and fuzzing to map networks, discover assets, and identify vulnerabilities using AI.
- Leverage AI-driven tools, MCP servers, and AI coding agents to automate and enhance every stage of information gathering and reconnaissance.
This live event is for you because...
- You’re a cybersecurity professional (analyst, engineer, architect, or consultant) looking to upgrade your skills for the AI-driven era.
- You’re an ethical hacker seeking to automate and enhance your offensive security capabilities.
- You’re a software developer or DevOps engineer focused on building secure applications and infrastructure.
- You’re an AI/ML engineer or data scientist interested in the latest trends in AI and cybersecurity.
- You’re interested in learning how real-world attackers compromise systems.
Prerequisites
- Course participants should have a basic understanding of cybersecurity and networking concepts.
Course Set-up
- Setup WebSploit Labs as documented at: https://websploit.org and review the information at http://hackertraining.org
Recommended Preparation
- Read: AI-Powered Digital Cyber Resilience by Omar Santos and Dr. Petar Radanliev
- Watch: Practical Cybersecurity Fundamentals by Omar Santos
- Attend: Modern Cybersecurity Fundamentals by Omar Santos
- Attend: AI-Enabled Programming, Networking, and Cybersecurity by Omar Santos
- Watch: Building the Ultimate Cybersecurity Lab and Cyber Range by Omar Santos
Recommended Follow-up
- Read: Redefining Hacking: A Comprehensive Guide to Red Teaming and Bug Bounty Hunting in an AI-driven World by Omar Santos, Savannah Lazzara, and Wesley Thurner
- Watch: Build Your Own AI Lab by Omar Santos
- Watch: Securing Generative AI by Omar Santos
- Watch: Defending and Deploying AI by Omar Santos
- Practice: Ethical Hacking Labs by Omar and Derek Santos
- Attend: AI and LLM Cyber Risks and Mitigations by Omar Santos
Schedule
The time frames are only estimates and may vary according to how the class is progressing.
Segment 1: Foundations of Ethical Hacking and Offensive Security (50 minutes)
- Ethical hacking methodologies and techniques
- Exploring how AI is changing cybersecurity
- Building your own pen testing lab with WebSploit Labs
- Introduction to MCP Servers for offensive security
- Introducing AI coding agents like Claude Code, Cursor, Codex, Windsurf, Co-pilot, Cline, AMP, and more
Break (10 minutes)
Segment 2: Foundations of Passive Reconnaissance and OSINT with AI (50 minutes)
- Introduction to passive reconnaissance and OSINT
- Gathering information about the target with the help of AI
- Using CertSpy to gather information about the target
- Subdomain enumeration with the help of AI
- Tools for passive reconnaissance and OSINT like Amass,Shodan, Censys, and many more
Break (10 minutes)
Segment 3: Using AI for Active Reconnaissance, Enumeration, Scanning, and Fuzzing (50 minutes)
- Introduction to Active Reconnaissance
- Introduction to scanning and enumerating the target with the help of AI
- Fuzzing techniques and tools
- Using the MCP and A2A scanners
- Using AI for active reconnaissance, scanning, and fuzzing
- Creating a comprehensive footprint of the target using AI
Course Wrap-up and Q&A (10 minutes)
Your Instructor
Omar Santos
Omar Santos is a Distinguished Engineer at Cisco focusing on advanced AI security research, cybersecurity, incident response, and vulnerability disclosure. He is the co-chair of the Coalition for Secure AI (CoSAI) alongside leading AI companies such as OpenAI, Google, Anthropic, and NVIDIA. Omar has served in the board of the OASIS Open standards organization and is also the chair of the OpenEoX and the Common Security Advisory Framework (CSAF) technical committee. His work led the creation of the CSAF ISO standard. Omar's collaborative efforts extend to numerous organizations, including OWASP, FIRST, and he was the lead of the DEF CON Red Team Village for several years. Omar is the author of over 25 books, 21 video courses, and over 50 academic research papers. Omar is a renowned expert in ethical hacking, vulnerability research, incident response, and AI security. Omar's work in cybersecurity is also recognized through multiple granted patents. Prior to Cisco, Omar served in the United States Marines focusing on the deployment, testing, and maintenance of Command, Control, Communications, Computer, and Intelligence (C4I) systems.