Chapter 2. Analyzing the Results of Network Reconnaissance
This chapter covers the following topics:
1.0 Threat Management
1.2 Given a scenario, analyze the results of a network reconnaissance.
Point-in-Time Data Analysis: Includes topics such as packet analysis, protocol analysis, traffic analysis, NetFlow analysis, and wireless analysis.
Data Correlation and Analytics: Includes topics such as anomaly analysis, trend analysis, availability analysis, heuristic analysis, and behavioral analysis.
Data Output: Investigates sources such as firewall ...
Get CompTIA Cybersecurity Analyst (CySA+) Cert Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.