4.1 Assess Organizational Security
Reconnaissance Tools
File Manipulation Tools

Shell and Script Environments
Packet Tools
Forensics Tools
Previous3.9 Public Key InfrastructureNext4.2 Policies, Processes, and Procedures for Incident Response
Last updated
Was this helpful?