Please enable JavaScript to use CodeHS

NCMF: 7.2.2b

CodeHS Lessons

The steps in an attack are footprinting, scanning, enumeration, network mapping, gaining access, privilege escalation, implant, and hiding tracks.

This standard does not have any mappings to our lessons yet.