YoVDO

How to Use Amass Efficiently

Offered By: NahamSec via YouTube

Tags

NahamCon Courses Cybersecurity Courses Ethical Hacking Courses Penetration Testing Courses Information Gathering Courses Reconnaissance Courses

Course Description

Overview

Discover the intricacies of efficient Amass usage in this comprehensive conference talk from NahamCon2020. Delve into expert insights shared by @jeff_foley as he explores advanced techniques and best practices for leveraging Amass, a powerful open-source information gathering tool. Learn how to optimize your reconnaissance processes, enhance your attack surface mapping capabilities, and streamline your cybersecurity workflows. Gain valuable knowledge on maximizing Amass's potential to uncover hidden subdomains, identify network boundaries, and gather critical intelligence for your security assessments or bug bounty hunting endeavors.

Syllabus

How to Use Amass Efficiently by @jeff_foley #NahamCon2020


Taught by

NahamSec

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network