
About Course
Ever wondered how ethical hackers find so much information without even touching a target system? That’s the power of recon!
In this beginner-friendly module, we’ll dive into the world of information gathering — the first and one of the most important steps in ethical hacking. You’ll learn how to uncover emails, subdomains, open ports, technologies, and even weak points — all using public data and free tools.
We’ll walk you through passive and active recon methods, show you how to use tools like Nmap, Shodan, Subfinder, and theHarvester, and even teach you how to write a clean recon report like the pros. No stress, no overly technical jargon — just hands-on learning, one step at a time.
If you’re planning to become a penetration tester, bug bounty hunter, or just want to level up your OSINT skills, this module is the perfect starting point.
Course Content
Overview
-
Introduction to Reconnaissance
-
Why Information Gathering is Crucial in Pentesting
-
Passive vs. Active Reconnaissance
-
Legal & Ethical Considerations