Search ALEX...

Course: Cybersecurity III

CTE22.IT.C3.31

Perform passive and active reconnaissance and analyze the results.

COS Examples

Examples: DNS lookups, identify technical and administrator contacts, cloud versus self-hosted, social media scraping, cryptographic flaws, company reputation and security posture, enumeration, website reconnaissance, packet crafting, defense detection, tokens, wardriving, network traffic, cloud asset discovery, detection avoidance, third-party hosted services

Course: Cybersecurity III

CTE22.IT.C3.31a

Use empirical data and evidence strategically to perform vulnerability scanning, social engineering and physical attacks, and post-exploitation techniques.

COS Examples

Examples: considerations and limitations of vulnerability scanning, scan identified targets for vulnerabilities, set scan settings to avoid detection, multiple scanning methods, Nmap, pretexting for social engineering or physical attacks, impersonation techniques, social engineering tools, methods of influence, post-exploitation tools, Pass the Hash, network segmentation testing, horizontal and vertical privilege escalation

Course: Cybersecurity III

CTE22.IT.C3.32

Outline the key components of written reports regarding the procedures and results of penetration testing, and explain the importance of maintaining transparent communication during the entire penetration testing process.

COS Examples

Examples: report audience, report contents, length of storage time for report, secure distribution, note-taking and ongoing documentation during testing including screenshots, common themes, root causes, communication path and associated triggers, reasons for communication, goal reprioritization, presentation of findings

ALSDE LOGO