Live Recon and Distributed Recon Automation Using Axiom
Offered By: NahamSec via YouTube
Course Description
Overview
Explore live recon and distributed recon automation techniques using Axiom in this informative conference talk featuring @pry0cc. Gain insights into advanced reconnaissance methods for bug bounty hunting and penetration testing. Learn how to leverage Axiom's powerful features to streamline and scale your recon processes across distributed infrastructure. Discover practical tips and strategies for enhancing your cybersecurity toolkit and improving your ability to identify potential vulnerabilities. Dive into real-world examples and demonstrations showcasing the effectiveness of Axiom in modern security assessments.
Syllabus
Live Recon and Distributed Recon Automation Using Axiom with @pry0cc
Taught by
NahamSec
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network