Chapter 1. Applying Environmental Reconnaissance Techniques
This chapter covers the following topics:
1.0 Threat Management
1.1 Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes.
Procedures/Common Tasks: Includes topics such as topology discovery, OS fingerprinting, service discovery, packet capture, log review, router/firewall ACLs review, e-mail harvesting, social media profiling, social engineering, DNS harvesting, and phishing.
Variables: Includes topics such as environmental issues affecting ...
Get CompTIA Cybersecurity Analyst (CySA+) Cert Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.