Previous Lecture Complete and continue  

  3.4 Exploring Passive Reconnaissance Methodologies: Searching for Names, Passwords, and Sensitive Information

Lecture contents locked

Enroll in Course to Unlock
If you're already enrolled, you'll need to login.