Exposure Management & Attack Surface
External attack-surface management (EASM), cyber asset attack-surface management (CAASM), continuous threat exposure management (CTEM), attack-path analysis, validation, and remediation orchestration.
Detect, Test & Respond
Watch, hunt, attack ethically, analyse, and respond — classical and AI.
Other domains in this layer
Certifications that signal this domain
Credentials whose blueprint meaningfully covers this domain. Core means centrally covered; also touched means present in the blueprint but not the primary focus.
Also touched
Certified Ethical Hacker
Offensive-concepts breadth; light on hands-on rigor compared to OSCP.
CompTIA Cybersecurity Analyst+
SOC analyst skills: triage, log analysis, vulnerability management basics.
Offensive Security Certified Professional
Hands-on penetration testing — exploitation, privilege escalation, AD attacks.
Offensive Security Web Expert
Advanced web application exploitation — whitebox review, vulnerability chain construction.
Browse all certifications → — pick a cert on the interactive map to highlight every domain it covers.
Curated resources
Authoritative sources we ground Exposure Management & Attack Surface questions in — frameworks, research, guides, and tools.
Gartner — Continuous Threat Exposure Management (CTEM)
Originating Gartner article that defined CTEM as a five-stage program: scoping, discovery, prioritization, validation, mobilization. The reference for the CTEM acronym and process model.
NIST SP 800-115 — Technical Guide to Information Security Testing
Federal methodology for security assessments: target identification, vulnerability analysis, validation. Underpins both penetration testing and exposure management programs.
Shodan — The Search Engine for Internet-Connected Devices
Industry-standard tool for external attack surface discovery. Scans the public internet, exposes service banners, supports queries for specific exposures. The reference for EASM tooling questions.
OWASP Attack Surface Analysis Cheat Sheet
Practical methodology for identifying and reducing attack surface in applications. Covers entry points, data flows, and trust boundaries. The application-layer complement to network EASM.
FIRST CVSS — Common Vulnerability Scoring System
The standardized vulnerability severity scoring system referenced by virtually every vuln management program. v3.1 widely deployed; v4.0 introduces threat and environmental refinements.
More in Cybersecurity
Test what you know about Exposure Management & Attack Surface
40 questions available. Beginner to expert questions, scored against the global leaderboard.