FOOTPRINTING AND SOCIAL ENGINEERINGClass #22290
Investigate how attackers gather passive information about their target from social media, search engines, various websites, etc. As a security professional you will learn the tools that attackers use to gather information and the counter-measures to reduce the likelihood of success of the attack.
Prerequisite: 10-150-122 LINUX SERVER 1.
|Days & Times||Room||Instructor||Meeting Dates|
|-||ONLINE INSTRUCTION||Mary Wirsing||-|