• Classroom
  • Online, Self-Paced
Course Description

Successful completion of this exam will demonstrate a candidate's ability to conduct different types of offensive activities or capabilities (such as: Computer Network Attack and Computer Network Exploitation) and recognize the toolkits, malicious code, and techniques used. The candidate's understanding of the activities that, through the use of cyberspace, actively gather information from computers, information systems, or networks, or manipulate, disrupt, deny, degrade, or destroy targeted computers, information systems, or networks will also be demonstrated.

Learning Objectives

Successful completion of this exam will demonstrate the candidate's ability to infiltrate target computer networks to extract and gather intelligence data. The candidate shall be able to demonstrate techniques and processes that use computers or computer networks to penetrate targeted systems and networks. They shall also be able to demonstrate how to collect sensitive or confidential data, which is typically kept hidden and protected from the general public.

Framework Connections

The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.