0
H
32
M
Time
intermediate
difficulty
The assessment will test your knowledge on Attack and Exploitation, Scanning and Enumeration, Information Gathering, Legal, Critical Infrastructure, Reporting, and Pentest Management. An Exploitation Analyst collaborates to identify access and collection gaps that can be satisfied through cyber collection and/or preparation activities. They leverage all authorized resources and analytic techniques to penetrate targeted networks.
Learning Partner
Cybrary