[Unlocked] System Administrators Use Foot

[Unlocked] System Administrators Use Foot

In the video you viewed,in 3 to 4 paragraphs describe the concepts of Foot Printing and Scanning/Enumeration. 

We’ve examined hacking, and how they can break into systems, but can system administrators use Foot Printing and Scanning/Enumeration to enable them to make their companies networks stronger – and to minimize the damage done by hackers?