Did you study brands?
I'm going through some Sec+ training and the trainers are specifying different brands or names of programs, ie popular hacker tools, packet reading programs, etc. Is it recommended that I memorize these? I did take Sec+ years ago, but I don't remember if there was anything that specific or if I just needed to know the basics... ie what types of packet reading programs are out there vs the actual brands of the programs. Hopefully that question isn't breaking any rules. I am not asking for actual question examples or anything of that nature. Just, where to focus my study. I didn't notice any brands listened on the exam objectives, so would that be a good indication to not focus on memorizing that? (I work for someone who gives me no choice in programs, so I don't have a lot of motivation to memorize them for use in the, "real world," either).
Comments
-
cyberguypr Mod Posts: 6,928 ModThe test objectives list what you should now. Haven't looked at them in a while but off the top of my head NMAP, Wireshark, Metasploit. Are those the tools you were referring to?
-
BlueRoze Member Posts: 27 ■■■□□□□□□□They have mentioned those and several others, such as Reaver for brute-force attacking routers, MiniStumber, Kismet, NetStumbler, etc. They have probably mentioned 20 or so specific tools. It's hard to tell if they are just mentioning an example just to mention an example, or if they are trying to relay test information. This training is not just regurgitating the test like some training models seem to be (FedVTE/Carnegie Mellon University).
-
iBrokeIT Member Posts: 1,318 ■■■■■■■■■□Brands? No. Tools? Yes.2019: GPEN | GCFE | GXPN | GICSP | CySA+
2020: GCIP | GCIA
2021: GRID | GDSA | Pentest+
2022: GMON | GDAT
2023: GREM | GSE | GCFA
WGU BS IT-NA | SANS Grad Cert: PT&EH | SANS Grad Cert: ICS Security | SANS Grad Cert: Cyber Defense Ops | SANS Grad Cert: Incident Response -
yoba222 Member Posts: 1,237 ■■■■■■■■□□Same here haven't seen the objectives, but it seems like most all infosec certs (the technical level ones) expect you to be able to associate the tool to its purpose (e.g. Hydra for password cracking). So I'd just flash card it for those 100 or so tools and be done with it. They'll come up again after this cert.A+, Network+, CCNA, LFCS,
Security+, eJPT, CySA+, PenTest+,
Cisco CyberOps, GCIH, VHL,
In progress: OSCP -
nisti2 Member Posts: 503 ■■■■□□□□□□Learn the tools and what they do.2020 Year goals:
Already passed: Oracle Cloud, AZ-900
Taking AZ-104 in December.
"Certs... is all about IT certs!"