Video Description

In this lesson, Subject Matter Expert Dean Pompilio discusses how the exploitation life-cycle is used to carry out the goals of hacking. The SME presents the five phases of the exploitation lifecycle:

  • reconnaissance

  • scanning

  • gaining access

  • maintaining access

  • clearing tracks

You will learn the tools and methods used by hackers and Social Engineers to successfully carry out each of the five phases with the aim of gaining unauthorized access to sensitive and confidential data and information about a person, company, organization, or government entity.

Course Modules

Instructed By

Instructor Profile Image
Polymath

INSIDER PRO

$99/mo

Subscribe to become an Insider Pro and get access to premium content such as:

Unlimited access to 700+ apps, including virtual labs, practice tests, capture-the-flag challenges, and more
Industry certification preparation
Guided Mentor
Premium support
Subscribe