🔐
CompTIA Security+
  • Introduction
  • Threats, Vulnerabilities, and Attacks
    • Threats
      • Threat Actors
      • Malware
    • Vulnerabilities
      • Vulnerability Research
      • Vulnerability Discovery
    • Attacks
      • Social Engineering
      • Password Guessing
      • Services & Applications
      • Wireless Communications
  • Technologies and Tools
    • Devices
      • Network Devices
      • Mobile Devices
    • Tools
    • Analysis
    • Troubleshooting
  • Architecture and Design
    • Frameworks & Guides
    • Cloud & Virtualization
    • Physical Security
    • Network Design
    • System Design
      • System Development
      • Application Security
      • Automation
    • Embedded Systems
  • Identity and Access Management
    • Concepts
    • Services
    • Controls
    • Procedures
  • Risk Management
    • Policy
    • Business Impact Analysis
    • Security Controls
    • Information Security
      • Data Security
      • Privacy
    • Contingency Planning
      • Incident Response
      • Disaster Recovery
      • Continuity of Operations
  • Cryptography and PKI
    • Concepts
    • Algorithms
    • Protocols
      • Authentication Protocols
      • Encryption Protocols
      • Network Service Protocols
    • Public Key Infrastructure
      • Concepts
      • Components
      • Certificates
Powered by GitBook
On this page
  • Scanning
  • Credentialed vs Non-Credentialed
  • Intrusive vs Non-Intrusive
  • Passively Testing Security Controls
  • False Positives
  • Penetration Testing
  • Reconnaissance
  • Initial Exploitation
  • Privilege Escalation
  • Persistence
  • Pivoting

Was this helpful?

  1. Threats, Vulnerabilities, and Attacks
  2. Vulnerabilities

Vulnerability Discovery

Explain vulnerability scanning concepts and penetration testing concepts.

Scanning

Credentialed vs Non-Credentialed

Intrusive vs Non-Intrusive

Passively Testing Security Controls

False Positives

Penetration Testing

Reconnaissance

Active Reconnaissance

Passive Reconnaissance

Initial Exploitation

Privilege Escalation

Persistence

Pivoting

PreviousVulnerability ResearchNextAttacks

Last updated 4 years ago

Was this helpful?