YoVDO

Recon & Discovery

Offered By: Bugcrowd via YouTube

Tags

Bug Bounty Courses Cybersecurity Courses Ethical Hacking Courses Subdomain Enumeration Courses

Course Description

Overview

Explore techniques for discovering assets owned by targeted companies and identifying tools in this comprehensive Bugcrowd University module on reconnaissance and discovery. Learn about the recon workflow, subdomain enumeration, fingerprinting, dorking, content discovery, and parameter discovery to enhance your cybersecurity skills and bug bounty hunting capabilities.

Syllabus

Recon and Discovery
Recon Workflow
Subdomain Enumeration
Fingerprinting
Dorking
Content Discovery
Parameter Discovery


Taught by

Bugcrowd

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network