Ethical Hacker: Covert Data Gathering
Ethical Hacker 10 | Intermediate
- 1 video | 28m 20s
- Includes Assessment
- Earns a Badge
Discover how spyware and keyloggers can be used to clandestinely gather data from a target system, as you prepare for the 312-50: Certified Ethical Hacker v10 exam.
WHAT YOU WILL LEARN
Describe the types of key loggers used to retrieve key stroke datadefine a means of capturing audio and video data
describe a method of capturing login credentials from a user
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.Digital badges are yours to keep, forever.