After reviewing the information in the Learn section for this Module: Week, discuss all of the following:
* What are best practices in technical techniques to detect and limit wireless network footprinting?
* What are best practices in technical techniques to detect and limit web services footprinting?
* What are the methods to leverage social engineering outcomes to technical wireless and web hacking methods?
* Provide a Christian worldview perspective on why to defend against web service hacking.
Leave a Reply
You must be logged in to post a comment.