From the course: Security Tips: Metadata

Unlock the full course today

Join today to access over 23,200 courses taught by industry experts.

Next steps

Next steps

- [Scott] We've spent some time looking at various aspects of embedded metadata and file system metadata. So, now, it's your turn to explore. Using the tools and techniques we've seen so far, spend some time investigating files of your own, see what information you can gather from a file, and practice editing or redacting tags from copies of files of your own. See you next time.

Contents