CHAPTER 2

Analyzing the Results of Reconnaissance

This chapter includes questions on the following topics:

•   Sources of data to consider in your analysis

•   Point-in-time data analysis

•   Data correlation and analysis

•   Common tools used in security analytics

In the prior chapter, you applied tools and techniques to conduct reconnaissance. Benefiting from reconnaissance takes more than just collecting information. To benefit, you need to both collect and analyze that information. The analysis is what changes the collected data into something useful—something that helps the security analyst identify and measure what an attacker would consider as targets.

Careful analysis involves a variety of sources and methods. Sources include various ...

Get CompTIA CySA+ Cybersecurity Analyst Certification Practice Exams (Exam CS0-001) now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.