• Online, Self-Paced
Course Description

Discover how spyware and keyloggers can be used to clandestinely gather data from a target system.

Learning Objectives

Certified Ethical Hacker - CEHv10: Covert Data Gathering

  • describe how spyware and keyloggers can be used to capture keystrokes, screenshots, and even audio/video data

Framework Connections

Specialty Areas

  • Cyber Operations
  • Cybersecurity Management
  • Exploitation Analysis
  • Vulnerability Assessment and Management