Master reconnaissance techniques for ethical hacking, pentesting, and bug bounties in this hands-on course. Learn to expand attack surfaces, perform subdomain enumeration, fuzz targets, and automate processes with industry-leading tools.
KPIs for Incident Response: Metrics and Measurements
Learn how to measure, analyze, and optimize your incident response (IR) program using key performance indicators (KPIs) and risk models. This course will help you develop skills to improve decision-making and reduce cybersecurity risks.
Learn how to identify and map potentially vulnerable external assets using OWASP Amass, the industry-standard tool for asset discovery. This course covers passive and active reconnaissance techniques to scan, analyze, and secure exposed assets.