Hacking Methodology (CBSC630)


Course Memo

_x000d_ This course provides students with an understanding of a hacker’s methodology, including the terms reconnaissance, enumeration, exploitation, persistent presence, covering tracks, maintenance and exfiltration. Students will see what is like to be in the mind of hacker and witness the patience that it takes to get into a network whether it is by getting a person to accidentally give them access or through shear brute force.