Academic Catalog 2022-2023 
    Mar 22, 2023  
Academic Catalog 2022-2023 [ARCHIVED CATALOG]

CYS 540 - Ethical Hacking and Cyber Kill Chain

(3) Introduction to ethical hacking using the Cyber Kill Chain model (which consists of seven steps: Reconnaissance, Weaponization, Delivery, Exploit, Installation, Command and Control, and Actions on Objectives). The Cyber Kill Chain model describes the phases of a targeted cyber attack. Ethical hacking is used by cyber practitioners to find vulnerabilities before an attacker is able to exploit them.

Prerequisites: CYS 501 .