We may earn an affiliate commission when you visit our partners.
Course image
Tim Tomes
Reconnaissance, also referred to as Open Source Intelligence (OSINT) gathering, is often viewed as the least important step of any information security testing methodology, and disregarded for this very reason. But rather than skip reconnaissance due to a...
Read more
Reconnaissance, also referred to as Open Source Intelligence (OSINT) gathering, is often viewed as the least important step of any information security testing methodology, and disregarded for this very reason. But rather than skip reconnaissance due to a perceived lack of value, we can increase its worth by reducing the time it takes to conduct these activities. In this course, Technical Information Gathering with Recon-ng, you will gain the ability to efficiently and effectively gather and analyze technical information from open sources. First, you will learn installation and configuration tips and be introduced to the interactive command line interface of Recon-ng. Next, you will discover installing, running, and configuring Recon-ng modules to harvest and transform data. Finally, you will explore how to analyze and export data for collaboration or use with other tools. When you are finished with this course, you will have the skills and knowledge of Recon-ng needed to accelerate the technical information gathering process and fuse results with the remainder of Red Team activities.
Enroll now

Here's a deal for you

We found an offer that may be relevant to this course.
Save money when you learn. All coupon codes, vouchers, and discounts are applied automatically unless otherwise noted.

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Teaches technical information gathering methods, which are core skills for Red Team activities
Taught by Tim Tomes, who are recognized for their work in information security
Develops skills in efficiently gathering and analyzing technical information from open sources
Provides hands-on experience with the Recon-ng open source tool
Suitable for learners with a background in information security or penetration testing

Save this course

Save Technical Information Gathering with Recon-ng to your list so you can find it easily later:
Save

Activities

Coming soon We're preparing activities for Technical Information Gathering with Recon-ng. These are activities you can do either before, during, or after a course.

Career center

Learners who complete Technical Information Gathering with Recon-ng will develop knowledge and skills that may be useful to these careers:
Ethical Hacker
An Ethical Hacker, also known as a penetration tester, may work to identify and exploit vulnerabilities in an organization's computer systems and networks with the aim of improving security. This course, Technical Information Gathering with Recon-ng, is relevant to Ethical Hackers as it teaches the skills required to gather and analyze open source intelligence.
Cybersecurity Architect
A Cybersecurity Architect designs and builds an organization's cybersecurity infrastructure. This course, Technical Information Gathering with Recon-ng, is relevant to Cybersecurity Architects as it can help build a foundation for the essential task of gathering and analyzing data to identify and mitigate security risks.
Forensic Analyst
A Forensic Analyst is responsible for collecting and analyzing digital evidence in order to investigate cyber crimes. This course, Technical Information Gathering with Recon-ng, is relevant to Forensic Analysts as it teaches how to use the Recon-ng framework to gather and analyze open source intelligence.
Cybersecurity Manager
A Cybersecurity Manager leads a team of professionals in implementing and managing an organization's cybersecurity program. This course, Technical Information Gathering with Recon-ng, can help prepare Cybersecurity Managers for the role by providing foundational training on how to gather and analyze open source intelligence. This course explores specific tools and techniques which are integral to the Cybersecurity Manager's daily responsibilities.
Incident Responder
An Incident Responder is responsible for responding to and managing security incidents such as data breaches or cyber attacks. This course, Technical Information Gathering with Recon-ng, may be useful to Incident Responders as it teaches the essential skills for gathering and analyzing evidence during an incident response.
Intelligence Analyst
An Intelligence Analyst gathers, analyzes, and interprets information to help decision makers address complex national security issues. This course, Technical Information Gathering with Recon-ng, may be useful to Intelligence Analysts as it covers the practical skills necessary for gathering and analyzing open source intelligence.
Information Security Manager
An Information Security Manager is responsible for developing and implementing an organization's information security policies and procedures. This course, Technical Information Gathering with Recon-ng, provides foundational information gathering skills for Information Security Managers as they learn how to collect and analyze data from a variety of sources, including open source intelligence.
Security Engineer
A Security Engineer works to implement and maintain an organization's security infrastructure, including firewalls and intrusion detection software. This course, Technical Information Gathering with Recon-ng, is relevant to Security Engineers because it covers the principles and techniques for effectively and efficiently gathering and analyzing open source intelligence. These skills may help build a foundation for the data gathering responsibilities of a Security Engineer.
Malware Analyst
A Malware Analyst is responsible for analyzing malicious software to identify and understand its behavior. This course, Technical Information Gathering with Recon-ng, may be useful to Malware Analysts as it teaches how to gather and analyze data about malware.
Security Consultant
A Security Consultant may work with clients to evaluate and improve their security programs. This course, Technical Information Gathering with Recon-ng, may be useful to Security Consultants, as they are often responsible for gathering and analyzing information about their clients' security posture.
Information Security Analyst
An Information Security Analyst, also known as an Information Assurance Analyst, secures an organization's computer systems and networks. This course, Technical Information Gathering with Recon-ng, is particularly relevant to Information Security Analysts because it teaches the ins and outs of gathering and analyzing open source data. This course may help build a foundation for the information gathering portion of an Information Security Analyst's responsibilities.
Information Systems Security Manager
An Information Systems Security Manager is responsible for overseeing an organization's information security program. This course, Technical Information Gathering with Recon-ng, may be useful to Information Systems Security Managers as it provides insights into how to effectively gather and analyze open source data. These skills may help build a foundation for information gathering duties crucial to an Information Systems Security Manager's daily work.
Network Security Engineer
A Network Security Engineer is responsible for designing, implementing, and maintaining an organization's network security infrastructure. This course, Technical Information Gathering with Recon-ng, is relevant to Network Security Engineers because it provides insights into gathering technical information about networks, a key responsibility for Network Security Engineers.
Cybersecurity Analyst
A Cybersecurity Analyst may work to identify and eliminate cybersecurity threats with the help of ethical hacking techniques. This course, Technical Information Gathering with Recon-ng, may be useful to a Cybersecurity Analyst as it teaches how to use the Recon-ng framework, an essential tool in the cybersecurity analyst's toolkit, to gather open source intelligence.
Data Analyst
A Data Analyst may examine and interpret data with the aim of drawing meaningful conclusions from it. This course, Technical Information Gathering with Recon-ng, may be useful to Data Analysts as it provides an overview of how to use the Recon-ng framework to gather and analyze data.

Reading list

We've selected ten books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Technical Information Gathering with Recon-ng.
Delves into the methodologies and techniques of open source intelligence (OSINT), providing a comprehensive understanding of the topic covered in the course.
Explores the psychological and social engineering aspects of security, providing insights into how attackers exploit human vulnerabilities. It complements the technical information gathering techniques taught in the course.
Provides a deep dive into Metasploit, an open-source tool for penetration testing and exploit development. It expands the knowledge gained in the course about using Recon-ng with other tools.
Offers a practical approach to penetration testing, covering reconnaissance and information gathering techniques. It complements the theoretical concepts taught in the course.
Provides a practical guide to ethical hacking, covering reconnaissance techniques and tools. It serves as a valuable reference for supplementing the hands-on exercises in the course.
Explores the vulnerabilities and attack techniques related to web applications. It provides a broader perspective on reconnaissance and information gathering in the context of web security.
Introduces Linux scripting for security tasks, providing a practical approach to automating information gathering and analysis. It enhances the technical skills developed in the course.
Provides a comprehensive guide to network penetration testing, including reconnaissance techniques and tools. It serves as a valuable reference for expanding the knowledge gained in the course.
Provides a practical introduction to reverse engineering, which complements the technical information gathering techniques taught in the course. It helps to understand how attackers analyze and exploit software.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Similar courses are unavailable at this time. Please try again later.
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser