Phases of a cyber-attack: reconnaissance, scanning, exploitation of faults and obtaining access, maintaining access, covering traces. Tools and hacking techniques used in cyber-attacks. Case Analysis of Cyber Attacks. Planning intrusion tests and considering legal aspects. Simulation of a cyberattack.
- Responsable du site: Valérie Baudart
- Enseignant (éditeur): Lucian Andrei