# Appendix B: Core Technical Skills

- [B4 - Network Mapping & Target Identification](/cyberwolf-security/training/certifications/crest/crest-crt/appendix-b-core-technical-skills/b4-network-mapping-and-target-identification.md)
- [B5 - Interpreting Tool Output](/cyberwolf-security/training/certifications/crest/crest-crt/appendix-b-core-technical-skills/b5-interpreting-tool-output.md)
- [B8 - OS Fingerprinting](/cyberwolf-security/training/certifications/crest/crest-crt/appendix-b-core-technical-skills/b8-os-fingerprinting.md)
- [B9 - Application Fingerprinting and Evaluating Unknown Services](/cyberwolf-security/training/certifications/crest/crest-crt/appendix-b-core-technical-skills/b9-application-fingerprinting-and-evaluating-unknown-services.md)
- [B13 - File System Permissions](/cyberwolf-security/training/certifications/crest/crest-crt/appendix-b-core-technical-skills/b13-file-system-permissions.md)
