2020 CAE Cyber Defense (CAE-CD) Knowledge Units

Exploitation of Cyber Operations . Cyber operations and other kinds of suspicious network activity are attempts to carry out intrusions into cleared contractor networks and exfiltrate protected information. This may be done through phishing operations, cyber intrusion, malicious network scans, the emplacement of viruses or malware, backdoor ................
................