Created by Lyndsay Badding
over 1 year ago
|
||
Packet Filtering Firewall
Stateless Firewall
Stateful Firewall
North-South Traffic
East-West Traffic
Fog Computing
Edge Computing
Port Mirroring
Packet Sniffing
8 tools
Protocol Analysis/Analyzer
Wireshark
Syslog
Types of Security Assessments
Vulnerability Scanners
OpenVAS
Lynis
Nikto
Intrusive vs Non-Intrusive Scans
Authenticated vs Non-Authenticated Scans
Network Monitoring Tools
11 tools
Pen Test Life Cycle
Threat Intelligence Types
IoC Examples
10 examples
Types of Malware
13 types
Types of Viruses
8 types
Prepending
Pretexting
Incident Response Steps
6 steps
Standards, Procedures, and Guidelines
Change Management vs Change Control
Geofencing
Geotagging
Time of Day
Colocation
Attestation
Secure Boot vs Measured Boot
DNS Sinkhole