What does it mean when an attacker is performing active reconnaissance on our network?
Make sure to subscribe so you don’t miss new content!
Looking to start a career in Information Security, Cyber Security, or Information Assurance? Check out all these resources to Get Started! https://www.jongood.com/getting-started/
Join my newsletter for a FREE copy of my eBook…Guide to Cyber Security Careers! https://www.jongood.com/newsletter/
When it comes to attackers, information gathering, or reconnaissance is extremely important and can be a determining factor in successful attacks. Through Active Reconnaissance techniques, attackers can gain valuable information about our network by interacting with various systems. Information can be gathered through techniques such as vulnerability scanning, operating system (OS) fingerprinting, and service or version detection.
Join me in this video as we define Active Reconnaissance and describe techniques that attackers might use against our networks. We will also go through a demonstration of a popular tool called NMAP to gather reconnaissance data against a lab target.
**NOTE: You should only perform testing against systems that you have written permission from the owner.**
This video is part of my course on CompTIA’s CySA+ (CS0-002) certification: https://www.jongood.com/product/comptia-cysa/
CySA+ Study Guide: https://amzn.to/2EcMIyf
#ActiveReconnaissance #CySA #NMAP
DISCLAIMER: I am an ambassador or affiliate for many of the brands referenced on the channel. As an Amazon Associate, I earn a commission from qualifying purchases.