• Online, Self-Paced
Course Description

Your pentests will only be successful if they are based on high-quality information gathered at the start of the engagement. If you want to leverage resources like Google Dorking, DNS queries, and other public data sources to set yourself up for a successful pentest, then check out this hands-on Recon 101 course.

Learning Objectives

By the end of this course, learners should be able to:
- Understand types of information that can be gathered from social media
- Understand types of information that can be gathered from whois
- Utilize Google Dorking to perform targeted searches
- Perform a DNS zone transfer to gather domain information
- Understand how to mitigate the risk of a domain zone transfer

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Cyber Operations
  • Exploitation Analysis

Specialty Areas have been removed from the NICE Framework. With the recent release of the new NICE Framework data, updates to courses are underway. Until this course can be updated, this historical information is provided to give better context as to how it can help you with your cybersecurity goals.