This course is designed for anyone interested in learning how an attacker uses Google Hacking to get the information by exploiting various vulnerabilities available. Learn how easily an attacker can get information, including username and passwords, different sensitive company data, and exploit the system’s weaknesses.
Course Components
To see prices please register or contact your certification consultant.
Custom configured devices are available. Please contact your certification consultants for details or click on the device request button below. For stock device configuration please click here.
Sign up to receive updates, promotions, and sneak peaks of upcoming products. Plus 20% off your next order.