YoVDO

Recon & Discovery

Offered By: Bugcrowd via YouTube

Tags

Bug Bounty Courses Cybersecurity Courses Ethical Hacking Courses Subdomain Enumeration Courses

Course Description

Overview

Explore techniques for discovering assets owned by targeted companies and identifying tools in this comprehensive Bugcrowd University module on reconnaissance and discovery. Learn about the recon workflow, subdomain enumeration, fingerprinting, dorking, content discovery, and parameter discovery to enhance your cybersecurity skills and bug bounty hunting capabilities.

Syllabus

Recon and Discovery
Recon Workflow
Subdomain Enumeration
Fingerprinting
Dorking
Content Discovery
Parameter Discovery


Taught by

Bugcrowd

Related Courses

Ethical Hacking
Indian Institute of Technology, Kharagpur via Swayam
Investigación en Informática Forense y Ciberderecho
University of Extremadura via Miríadax
MSc Cyber Security
Coventry University via FutureLearn
Network Security - Introduction to Network Security
New York University (NYU) via edX
Network Security - Advanced Topics
New York University (NYU) via edX