This lesson is for subscribers
You've completed the free preview. Subscribe to unlock every lesson in every course.
Extracting sensitive information from improperly disposed documents, media, and hardware to support further attacks.
You've completed the free preview. Subscribe to unlock every lesson in every course.