What does it mean when an attacker is performing passive reconnaissance or passive foot printing on our network?
Make sure to subscribe so you don’t miss new content!
Looking to start a career in Information Security, Cyber Security, or Information Assurance? Check out all these resources to Get Started! https://www.jongood.com/getting-started/
Join my newsletter for a FREE copy of my eBook…Guide to Cyber Security Careers! https://www.jongood.com/newsletter/
When it comes to attackers, information gathering, or reconnaissance is extremely important and can be a determining factor in successful attacks. Through Passive Reconnaissance techniques, attackers can gain valuable information about our network without directly interacting with systems. Information can be gathered from places such as network device configurations, network services like DNS, and external websites like the Wayback Machine.
Join me in this video as we define Passive Reconnaissance and describe techniques that attackers might use against our networks. By the time you have finished this video, you will be much more informed about various places to identify sensitive information being leaked about your network.
This video is part of my course on CompTIA’s CySA+ (CS0-002) certification: https://www.jongood.com/product/comptia-cysa/
CySA+ Study Guide: https://amzn.to/2EcMIyf
#PassiveReconnaissance #CySA #CompTIA
DISCLAIMER: I am an ambassador or affiliate for many of the brands referenced on the channel. As an Amazon Associate, I earn a commission from qualifying purchases.