Welcome!

By registering with us, you'll be able to discuss, share and private message with other members of our community.

SignUp Now!
  • ⚡💰 Upgrade Your Account & Get Premium Benefits! 💰⚡

  • 📢 Contact if any issue or question

    Need help or have a question? Feel free to contact us on Telegram!

    📩 Contact on Telegram
  • 🚀 HOW TO EARN CREDITS, LOCK THREADS & HIDE THREADS! 🚀

Free Courses Ethical Hacking Recon and the Dark Web

Status
Not open for further replies.

Astaroth

Moderator
Moderator
Joined
Oct 13, 2023
Messages
1,560
Reaction score
674
Credits
1,887
Active and Passive Reconnaissance and Dark Web Research

What you’ll learnIs this live event for you?Schedule
  • Learn how to stay safe while performing dark web research and reconnaissance
  • Hands-on exercises so you can learn in real-time how to perform passive and active reconnaissance
  • Learn from real bug bounty hunters
This live and interactive training is designed to help you perform passive and active reconnaissance in ethical hacking and bug bounty hunting engagements. You will learn intermediate-to-advanced recon methodologies using open source intelligence (OSINT). In this training you will also learn how to perform dark web research and reconnaissance. You will learn how to use Tor, proxies and proxychains, and even how to create your own VPN servers in cloud environments.

What you’ll learn and how you can apply it

  • Learn passive reconnaissance and OSINT techniques.
  • Learn how to perform active reconnaissance for bug bounty hunting and ethical hacking engagements.
  • Learn how to stay safe while performing dark web research and reconnaissance.
  • Learn through step-by-step demonstrations.
  • Complete hands-on exercises and participate in interactive discussions.

This live event is for you because...

  • You have an understanding of cybersecurity fundamentals.
  • You want to prepare for certifications such as OSCP, OSWE, GIAC Web Application Penetration Tester (GWAPT), GIAC Certified Incident Handler (GCIH), and the GIAC Exploit Researcher and Advanced Penetration Tester (GXPN).
  • You want to learn how to perform reconnaissance for bug bounty and ethical hacking engagements.
  • Anyone interested in cybersecurity, dark web research, and penetration testing (ethical hacking) will benefit from this training.

Prerequisites

  • Course participants should have a basic understanding of cybersecurity, virtualization, and networking concepts.
Course Set-up
Recommended Preparation
Recommended Follow-up

Schedule

The time frames are only estimates and may vary according to how the class is progressing.

Day 1

Introduction to Passive Recon and OSINT (20 minutes)

Using Recon-NG and SpiderFoot (30 minutes)

Break: 10 minutes

Using Shodan and the Shodan API (30 minutes)

Using Maltego and the Harvester (30 minutes)

Break: 10 minutes

Introduction to Active Recon (20 minutes)

Port and Vulnerability Scanning (30 minutes)

Break: 10 minutes

Subdomain Enumeration (20 minutes)

Directory Enumeration (20 minutes)

Account Enumeration 10 minutes

Day 2

The Deep Web vs. the Dark Web (20 minutes)

Introduction to Tor (20 minutes)

Using the Tor Browser (20 minutes)

Break: 10 minutes

Using Proxies and Proxy Chains (20 minutes)

Creating Your Own VPN Server in the Cloud (30 minutes)

Break: 10 minutes

Staying Safe when Performing Dark Web Research (50 minutes)

Break: 10 minutes

Performing Dark Web Reconnaissance (50 minutes)



You must reply in thread to view hidden text or upgrade your account to always see hidden content.

 
Status
Not open for further replies.
Back
Top