Chapter 2. Analyzing the Results of Network Reconnaissance

This chapter covers the following topics:

1.0 Threat Management

1.2 Given a scenario, analyze the results of a network reconnaissance.

Image Point-in-Time Data Analysis: Includes topics such as packet analysis, protocol analysis, traffic analysis, NetFlow analysis, and wireless analysis.

Image Data Correlation and Analytics: Includes topics such as anomaly analysis, trend analysis, availability analysis, heuristic analysis, and behavioral analysis.

Data Output: Investigates sources such as firewall ...

Get CompTIA Cybersecurity Analyst (CySA+) Cert Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.