Module 6 Summary

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with

Already have an account? Sign In »

2 hours 26 minutes
Video Transcription
Welcome back since we talked about ways how you could potentially find a lot about the target person or a company. This module was dedicated to the defense part of faucet to be more accurate opsec or operational security which we defined and gave to hopefully cool examples of a possible attack vectors.
Also, please check the resource section off this course for materials for your further upset studies.
In the next video, we'll conclude this course but will not conclude our further studies to be better at O wasn't so See you in the next slash last video.
Up Next
Open Source Intelligence (OSINT) Fundamentals

In this Open Source Intelligence (OSINT) Fundamentals training course, you will gain fundamental knowledge about OSINT, who uses it, and the ethical implications of using it. Upon completion, students will have a solid understanding of OSINT.

Instructed By