Ethical Hacker: Covert Data Gathering

Ethical Hacker 10    |    Intermediate
  • 1 video | 28m 20s
  • Includes Assessment
  • Earns a Badge
Rating 4.5 of 18 users Rating 4.5 of 18 users (18)
Discover how spyware and keyloggers can be used to clandestinely gather data from a target system, as you prepare for the 312-50: Certified Ethical Hacker v10 exam.

WHAT YOU WILL LEARN

  • Describe the types of key loggers used to retrieve key stroke data
    define a means of capturing audio and video data
  • describe a method of capturing login credentials from a user

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 4.4 of 17 users Rating 4.4 of 17 users (17)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 1889 users Rating 4.5 of 1889 users (1889)
Rating 4.6 of 28 users Rating 4.6 of 28 users (28)
Rating 4.4 of 20 users Rating 4.4 of 20 users (20)