Course Description
Discover how spyware and keyloggers can be used to clandestinely gather data from a target system.
Learning Objectives
Certified Ethical Hacker - CEHv10: Covert Data Gathering
- describe how spyware and keyloggers can be used to capture keystrokes, screenshots, and even audio/video data