Type
Post Secondary
Credits
1.00

Investigate how attackers gather passive information about their target from social media, search engines, various websites, etc. As a security professional you will learn the tools that attackers use to gather information and the counter-measures to reduce the likelihood of success of the attack.

Conditions
Prerequisite: 10-150-122 LINUX SERVER 1.

Availability & Registration

We offer the following class sections for this course (10-151-101). View more class specific details and registration information by selecting a class number.