Risk Management Approach and Practices You do not have access to this note. Post navigationPrevious post: Module 02: Footprinting and ReconnaissanceNext post: Lab: Perform Footprinting Through Search Engines – Task: Gather Information using Advanced Google Hacking Techniques