Provides an in-depth investigation of threat actors and the techniques they employ to attack networks. This course covers threat capabilities and objectives. Formal ethical hacking methodology including reconnaissance, scanning and enumeration, gaining access, escalation of privilege, maintaining access, and reporting is examined.
2025-2026
Catalog Resources
- About 大象传媒
- Paying for College
- Student Resources and Services
- Student Academic Records
- Academic Policies and Procedures
- Legal Notices
- Academic Programs
- Academic Plans
- Courses
- June 2025 Addendum
- Administrators and Faculty
- Workforce and Community Programs
- Littleton Campus Map
- Sturm Collaboration Campus Map
- DCSC Legacy Campus Map
- Archived Catalogs
Programs by Pathway
Cyber Threat Intelligence
CNG
4010