In the video you viewed,in 3 to 4 paragraphs describe the concepts of Foot Printing and Scanning/Enumeration.
We’ve examined hacking, and how they can break into systems, but can system administrators use Foot Printing and Scanning/Enumeration to enable them to make their companies networks stronger – and to minimize the damage done by hackers?