Career and Technical Education (2022) Grade(s): 10-12 - Information Technology

CTE22.IT.C3.31a

Use empirical data and evidence strategically to perform vulnerability scanning, social engineering and physical attacks, and post-exploitation techniques.

COS Examples

Examples: considerations and limitations of vulnerability scanning, scan identified targets for vulnerabilities, set scan settings to avoid detection, multiple scanning methods, Nmap, pretexting for social engineering or physical attacks, impersonation techniques, social engineering tools, methods of influence, post-exploitation tools, Pass the Hash, network segmentation testing, horizontal and vertical privilege escalation

ALSDE LOGO