Chapter 1. Applying Environmental Reconnaissance Techniques

This chapter covers the following topics:

1.0 Threat Management

1.1 Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes.

Image Procedures/Common Tasks: Includes topics such as topology discovery, OS fingerprinting, service discovery, packet capture, log review, router/firewall ACLs review, e-mail harvesting, social media profiling, social engineering, DNS harvesting, and phishing.

Image Variables: Includes topics such as environmental issues affecting ...

Get CompTIA Cybersecurity Analyst (CySA+) Cert Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.