Ethical Hacker: Covert Data Gathering

Ethical Hacker 10    |    Intermediate
  • 1 Video | 29m 50s
  • Includes Assessment
  • Earns a Badge
Likes 43 Likes 43
Discover how spyware and keyloggers can be used to clandestinely gather data from a target system, as you prepare for the 312-50: Certified Ethical Hacker v10 exam.

WHAT YOU WILL LEARN

  • define a means of capturing audio and video data
    describe a method of capturing login credentials from a user
  • describe the types of key loggers used to retrieve key stroke data

IN THIS COURSE

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Likes 84 Likes 84  
Likes 26 Likes 26  
Likes 31 Likes 31  

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Likes 55 Likes 55  
Likes 51 Likes 51