Ethical Hacking 101: Hacker Types, Cyberattacks & Reconnaissance — Part 3