Cybersecurity reconnaissance is every offensive security professional’s bread and butter. Whether it’s penetration testing, bug bounty hunting, or security research, recon is an essential component in an offensive security toolkit.
This course is a deep-dive into security recon and the various techniques we use to find threats in applications of all kinds. Using hands-on labs to perform these activities in real-world environments, we’ll be learning how to do manual and automated recon, how coding factors into your recon strategies, and perform subdomain discovery and bruteforcing.
In addition, we’re going to train in bucket hunting, github recon, dorking, analyzing JS files, and a whole lot more. Upon completing this course, you’ll have mastered several techniques and strategies in security recon which you can use in the real world.