Intermediate – Exploitation Analyst Current Status Not Enrolled Price $59.00 Get Started orLogin Course Content Cyber attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks). Computer networking concepts and protocols, and network security methodologies. Risk management processes (e.g., methods for assessing and mitigating risk). Laws, regulations, policies, and ethics as they relate to cybersecurity and privacy. Cybersecurity and privacy principles. Cyber threats and vulnerabilities. Specific operational impacts of cybersecurity lapses. Concepts, terminology, and operations of a wide range of communications media (computer and telephone networks, satellite, fiber, wireless). Physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, Network Interface Cards, data storage). Web mail collection, searching/analyzing techniques, tools, and cookies. Collection management processes, capabilities, and limitations. Front-end collection systems, including traffic collection, filtering, and selection. Applicable statutes, laws, regulations and policies governing cyber targeting and exploitation.