• Online, Self-Paced
Course Description

Discover how spyware and keyloggers can be used to clandestinely gather data from a target system.

Learning Objectives

Certified Ethical Hacker - CEHv10: Covert Data Gathering

  • describe how spyware and keyloggers can be used to capture keystrokes, screenshots, and even audio/video data

Framework Connections

Feedback

If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.