• Online, Self-Paced
Course Description

Discover how spyware and keyloggers can be used to clandestinely gather data from a target system.

Learning Objectives

Certified Ethical Hacker - CEHv10: Covert Data Gathering

  • describe how spyware and keyloggers can be used to capture keystrokes, screenshots, and even audio/video data

Framework Connections