23 Feb 2021
Respond to one of the following:
- Discuss any aspect of “honeypots” and share your views on the value of such honeypots for ethical hackers, or how as a security professional you can protect yourself against providing such honeypots for exploitation.
- Any current topic or article related to penetration techniques.