Ethical Hacker: Covert Data Gathering
Ethical Hacker 10 | Intermediate
- 1 Video | 28m 20s
- Includes Assessment
- Earns a Badge
Discover how spyware and keyloggers can be used to clandestinely gather data from a target system, as you prepare for the 312-50: Certified Ethical Hacker v10 exam.
WHAT YOU WILL LEARN
describe the types of key loggers used to retrieve key stroke datadefine a means of capturing audio and video data
describe a method of capturing login credentials from a user
IN THIS COURSE
1.Covert Data Gathering28m 21s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platformDigital badges are yours to keep, forever.