YoVDO

Red Team Reconnaissance Techniques

Offered By: HackerSploit via YouTube

Tags

Red Team Courses Cybersecurity Courses Information Gathering Courses

Course Description

Overview

Explore active and passive reconnaissance techniques used in Red Team operations through this comprehensive video. Delve into methods for gathering crucial information about target organizations, infrastructure, and personnel to support various phases of adversary operations. Learn how collected data can be leveraged for initial access, post-compromise objectives, and further reconnaissance efforts. Discover tools like Sn1per and OWASP Amass, and gain insights into the MITRE ATT&CK Framework. Access additional resources, including a detailed writeup and links to related content, to enhance your understanding of Red Team reconnaissance strategies and their applications in cybersecurity.

Syllabus

Red Team Reconnaissance Techniques


Taught by

HackerSploit

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network