Ethical Hacker: Covert Data Gathering
Ethical Hacker 10 | Intermediate
- 1 Video | 28m 20s
- Includes Assessment
- Earns a Badge
Discover how spyware and keyloggers can be used to clandestinely gather data from a target system, as you prepare for the 312-50: Certified Ethical Hacker v10 exam.
WHAT YOU WILL LEARN
describe the types of key loggers used to retrieve key stroke datadefine a means of capturing audio and video data
describe a method of capturing login credentials from a user
IN THIS COURSE
1.Covert Data Gathering28m 21s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platformDigital badges are yours to keep, forever.
YOU MIGHT ALSO LIKE
PEOPLE WHO VIEWED THIS ALSO VIEWED THESE