Recon in Cybersecurity is Out!

Cristi Vlad
2 min readJun 16, 2020

--

I have been more than super-excited to work at conceptualizing, thinking, writing, recording, editing, and publishing this course.

You wanna know why? Because recon is something I love to the moon and back!

I won’t brag much about this, but I need to tell you that as a life-long learner and as someone always looking to level-up my skills in cybersecurity, I hate that most of the materials out there are beginner-oriented.

The majority of the existing courses and learning materials teach you how to install tools and setup environments and spend very little time on pure, practical, and readily implementable information.

And that’s exactly what this course is not!

I’m not teaching you how to setup Kali Linux or how to install the tools we’re using. I assume you’ve already done that.

This is an intermediate level course. It’s a combination of practical advice and hands-on testing derived from my experience (up to this point) in bug bounty hunting and security research.

Most of the lessons are accompanied by resources documents where I link to all the tools that I’m using, their documentation, and other relevant resources. Therefore, if you want to know how to set up a tool or use it in different ways to what I’m teaching in the lessons, you can do it at your own discretion.

Enough said. Take the course here and up your recon skills in cybersecurity!

And do me a favor! Leave a review once you’re done. It motivates me to keep educating.

--

--

No responses yet