CompTIA PenTest+
1 Threats, Attacks, and Vulnerabilities
1-1 Common Threat Actors
1-2 Threat Intelligence Sources
1-3 Threat Actors and Motives
1-4 Threat Actor Tactics, Techniques, and Procedures (TTPs)
1-5 Vulnerability Types
1-6 Exploit Types
1-7 Attack Types
1-8 Threat Detection and Monitoring
1-9 Threat Hunting
1-10 Incident Response
2 Architecture and Design
2-1 Security Controls
2-2 Network Architecture
2-3 Cloud and Virtualization
2-4 Web Application Security
2-5 Wireless Security
2-6 Mobile Security
2-7 IoT Security
2-8 Industrial Control Systems (ICS) Security
2-9 Physical Security
2-10 Secure Software Development
3 Tools and Code
3-1 Penetration Testing Tools
3-2 Exploitation Tools
3-3 Post-Exploitation Tools
3-4 Reporting Tools
3-5 Scripting and Automation
3-6 Programming Languages
3-7 Code Analysis
3-8 Open Source Intelligence (OSINT) Tools
4 Planning and Scoping
4-1 Penetration Testing Methodologies
4-2 Legal and Compliance Considerations
4-3 Scope Definition
4-4 Risk Assessment
4-5 Threat Modeling
4-6 Information Gathering
4-7 Asset Identification
4-8 Data Classification
4-9 Business Impact Analysis
4-10 Penetration Testing Objectives
5 Information Gathering and Vulnerability Identification
5-1 Passive Reconnaissance
5-2 Active Reconnaissance
5-3 Vulnerability Scanning
5-4 Network Mapping
5-5 Service Identification
5-6 Web Application Scanning
5-7 Wireless Network Scanning
5-8 Social Engineering Techniques
5-9 OSINT Techniques
5-10 Vulnerability Databases
6 Attacks and Exploits
6-1 Exploit Development
6-2 Buffer Overflows
6-3 SQL Injection
6-4 Cross-Site Scripting (XSS)
6-5 Cross-Site Request Forgery (CSRF)
6-6 Command Injection
6-7 Privilege Escalation
6-8 Lateral Movement
6-9 Evasion Techniques
6-10 Exploit Delivery Methods
7 Penetration Testing Process
7-1 Pre-Engagement Activities
7-2 Reconnaissance
7-3 Scanning and Enumeration
7-4 Exploitation
7-5 Post-Exploitation
7-6 Reporting
7-7 Remediation
7-8 Retesting
7-9 Documentation and Evidence Collection
7-10 Communication and Coordination
8 Reporting and Communication
8-1 Report Structure
8-2 Executive Summary
8-3 Technical Findings
8-4 Risk Assessment
8-5 Remediation Recommendations
8-6 Legal and Compliance Considerations
8-7 Presentation Skills
8-8 Communication with Stakeholders
8-9 Documentation Standards
8-10 Continuous Improvement
9 Security and Compliance
9-1 Regulatory Requirements
9-2 Industry Standards
9-3 Compliance Audits
9-4 Data Protection
9-5 Privacy Laws
9-6 Incident Response Planning
9-7 Disaster Recovery Planning
9-8 Business Continuity Planning
9-9 Risk Management
9-10 Security Awareness Training
Threat Detection and Monitoring

Threat Detection and Monitoring

Key Concepts

1. Intrusion Detection Systems (IDS)

Intrusion Detection Systems (IDS) are security tools designed to monitor network traffic and system activities for suspicious behavior. They can be either network-based or host-based. Network-based IDS (NIDS) monitors traffic across the entire network, while host-based IDS (HIDS) focuses on individual systems.

Example: A NIDS might detect a large number of failed login attempts from a single IP address, indicating a brute-force attack. A HIDS could monitor file system changes on a server to detect unauthorized modifications.

2. Intrusion Prevention Systems (IPS)

Intrusion Prevention Systems (IPS) are similar to IDS but have the additional capability to take automated actions to prevent detected threats. IPS can block malicious traffic, quarantine infected systems, and apply security policies in real-time.

Example: An IPS might automatically block an IP address that is attempting to exploit a known vulnerability in a web application, preventing further attacks.

3. Security Information and Event Management (SIEM)

Security Information and Event Management (SIEM) systems collect and analyze log data from various sources across the network. SIEM tools provide real-time analysis of security alerts generated by network hardware and applications, helping to identify and respond to threats more effectively.

Example: A SIEM system might correlate logs from firewalls, servers, and applications to detect a pattern of activity that indicates a phishing campaign is underway, allowing security teams to take immediate action.

4. Log Management

Log management involves collecting, storing, and analyzing logs from various devices and applications. Effective log management helps in identifying security incidents, troubleshooting issues, and meeting compliance requirements.

Example: A company might use a centralized log management system to store logs from all its servers, network devices, and applications. This allows for easy retrieval and analysis of logs when investigating a security incident.

5. Behavioral Monitoring

Behavioral monitoring involves analyzing the behavior of users and systems to detect anomalies that could indicate a security threat. This approach is useful for identifying insider threats and advanced persistent threats (APTs).

Example: A behavioral monitoring tool might detect that an employee is accessing sensitive data outside of their normal working hours, raising a flag for further investigation.

Analogies and Examples

Consider a bank as an analogy for a computer network. The bank's security guards represent IDS, who monitor the premises for suspicious activity. If they see something suspicious, they alert the bank manager (security team). The bank's alarm system represents IPS, which can automatically lock the doors and call the police if an intrusion is detected. The bank's surveillance system represents SIEM, which records all activities and allows for later analysis. The bank's logbook represents log management, where all transactions and events are recorded. Finally, the bank's behavior monitoring system might be like a manager who notices an employee acting unusually and decides to investigate further.

By understanding and implementing these threat detection and monitoring techniques, organizations can significantly enhance their security posture and respond more effectively to potential threats.