Tag phases

Software Project Management

This post is  related in some ways related with Application Lifecycle Management (APL), DevOps and Continous integration (CI). Software Development Model Software development models or software development lifecycle models. You can find a list on this post. The most popular…

Cybersecurity Attack Phases

According to EC-Council EC-Council identify in the CEH course 5 hacking phases: Reconnaissance Scanning Gaining Access Maintaining Access Clearing Tracks According to ISACA ISACA identify 8 phases in a cybersecurity generalized attack processs: Perform reconnaissance Create attack tools Deliver malicious…