Assignment:
In the video you viewed in 3 to 4 paragraphs describe the concepts of Foot Printing and Scanning/Enumeration.
We've examined hacking, and how they can break into systems, but can system administrators use Foot Printing and Scanning/Enumeration to enable them to make their companies networks stronger - and to minimize the damage done by hackers?
https://www.youtube.com/watch?time_continue=1&v=29X0_3aJ8pE&feature=emb_title