Type
Post Secondary
Credits
1.00

Investigate how attackers gather passive information about their target from social media, search engines, various websites, etc. As a security professional you will learn the tools that attackers use to gather information and the counter-measures to reduce the likelihood of success of the attack.

Conditions
Student has completed all of the following course(s): CISNET 10150122 - Linux Server 1

Availability & Registration

We offer the following class sections for this course (10-151-101). View more class specific details and registration information by selecting a class number.