Pre-Attack Phase: Two Types of Information Gathering

Length: 00:05:27

Lesson Summary:

All attacks are done in phases, sometimes the attacker is aware of this and sometimes they are not. Either way, every attack on any given system goes through the same set of phases. Let us have a closer look at those phases.

This lesson is only available to Linux Academy members.

Sign Up To View This Lesson

Or Log In

Looking For Team Training?

Learn More