Skip to content
  • Sign In
  • Try Now
View all events
Penetration Testing / Ethical Hacking

Ethical Hacking Recon and the Dark Web

Published by Pearson

Intermediate content levelIntermediate

Active and Passive Reconnaissance and Dark Web Research

  • Learn how to stay safe while performing dark web research and reconnaissance
  • Hands-on exercises so you can learn in real-time how to perform passive and active reconnaissance
  • Learn from real bug bounty hunters

This live and interactive training is designed to help you perform passive and active reconnaissance in ethical hacking and bug bounty hunting engagements. You will learn intermediate-to-advanced recon methodologies using open source intelligence (OSINT). In this training you will also learn how to perform dark web research and reconnaissance. You will learn how to use Tor, proxies and proxychains, and even how to create your own VPN servers in cloud environments.

What you’ll learn and how you can apply it

  • Learn passive reconnaissance and OSINT techniques.
  • Learn how to perform active reconnaissance for bug bounty hunting and ethical hacking engagements.
  • Learn how to stay safe while performing dark web research and reconnaissance.
  • Learn through step-by-step demonstrations.
  • Complete hands-on exercises and participate in interactive discussions.

This live event is for you because...

  • You have an understanding of cybersecurity fundamentals.
  • You want to prepare for certifications such as OSCP, OSWE, GIAC Web Application Penetration Tester (GWAPT), GIAC Certified Incident Handler (GCIH), and the GIAC Exploit Researcher and Advanced Penetration Tester (GXPN).
  • You want to learn how to perform reconnaissance for bug bounty and ethical hacking engagements.
  • Anyone interested in cybersecurity, dark web research, and penetration testing (ethical hacking) will benefit from this training.

Prerequisites

  • Course participants should have a basic understanding of cybersecurity, virtualization, and networking concepts.

Course Set-up

Recommended Preparation

Recommended Follow-up

Schedule

The time frames are only estimates and may vary according to how the class is progressing.

Day 1

Introduction to Passive Recon and OSINT (20 minutes)

Using Recon-NG and SpiderFoot (30 minutes)

Break: 10 minutes

Using Shodan and the Shodan API (30 minutes)

Using Maltego and the Harvester (30 minutes)

Break: 10 minutes

Introduction to Active Recon (20 minutes)

Port and Vulnerability Scanning (30 minutes)

Break: 10 minutes

Subdomain Enumeration (20 minutes)

Directory Enumeration (20 minutes)

Account Enumeration 10 minutes

Day 2

The Deep Web vs. the Dark Web (20 minutes)

Introduction to Tor (20 minutes)

Using the Tor Browser (20 minutes)

Break: 10 minutes

Using Proxies and Proxy Chains (20 minutes)

Creating Your Own VPN Server in the Cloud (30 minutes)

Break: 10 minutes

Staying Safe when Performing Dark Web Research (50 minutes)

Break: 10 minutes

Performing Dark Web Reconnaissance (50 minutes)

Your Instructors

  • Omar Santos

    Omar Santos is a Distinguished Engineer at Cisco focusing on artificial intelligence (AI) security, research, incident response, and vulnerability disclosure. He is a board member of the OASIS Open standards organization and the founder of OpenEoX. Omar's collaborative efforts extend to numerous organizations, including the Forum of Incident Response and Security Teams (FIRST) and the Industry Consortium for Advancement of Security on the Internet (ICASI). Omar is the co-chair of the FIRST PSIRT Special Interest Group (SIG). Omar is the lead of the DEF CON Red Team Village and the chair of the Common Security Advisory Framework (CSAF) technical committee. Omar is the author of over 20 books, numerous video courses, and over 50 academic research papers. Omar is a renowned expert in ethical hacking, vulnerability research, incident response, and AI security. His dedication to cybersecurity has made a significant impact on technology standards, businesses, academic institutions, government agencies, and other entities striving to improve their cybersecurity programs.

    linkedinXlinksearch
  • Joseph Mlodzianowski

    Joseph Mlodzianowski is a twenty-five-year veteran of the cybersecurity field and considered a security aficionado by his peers. He is a traveler and adventurer. He is involved in M3AAWG Messaging Malware Mobile Anti-Abuse industry working group. Joseph is a Security Architect in Cisco’s Managed and Intelligence services. Joseph worked in/for the Department of Defense in various SME roles. He is also involved in the Cisco exam criteria and curriculum for certifications, and he has authored several books. You can also learn more about him on twitter @cedoxx or at darkwb.sh.

    linkedinXlinksearch