From the course: Security Tips: Metadata
Unlock the full course today
Join today to access over 23,200 courses taught by industry experts.
Next steps
“
- [Scott] We've spent some time looking at various aspects of embedded metadata and file system metadata. So, now, it's your turn to explore. Using the tools and techniques we've seen so far, spend some time investigating files of your own, see what information you can gather from a file, and practice editing or redacting tags from copies of files of your own. See you next time.