Tools and Methods Used in Cybercrime Part 1 | Dr. Reshma Kadam
This video covers an introduction to cybercrime tools and methods, including reconnaissance, scanning, gaining access, and maintaining access.

Reshma Patil
1.6K views โข Jan 22, 2022

About this video
This video contains information about:
Tools and Methods Used in Cybercrime,
- Introduction
- Reconnaissance
- Scanning
- Gaining Access
- Maintaining Access
- Covering Tracks
- Proxy Servers
- Purpose of Proxy Server
- Anonymizers
- Purpose of Anonymizers
- Example of Anonymizer
- Phishing
- How does Phishing Works?
- Example of Phishing
Tools and Methods Used in Cybercrime,
- Introduction
- Reconnaissance
- Scanning
- Gaining Access
- Maintaining Access
- Covering Tracks
- Proxy Servers
- Purpose of Proxy Server
- Anonymizers
- Purpose of Anonymizers
- Example of Anonymizer
- Phishing
- How does Phishing Works?
- Example of Phishing
Tags and Topics
Browse our collection to discover more content in these categories.
Video Information
Views
1.6K
Likes
28
Duration
42:36
Published
Jan 22, 2022
User Reviews
4.5
(1) Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.