Did you know Cybrary has FREE video training? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.
• The Stenography lab is designed to test student's understanding of how stenography works and it also tests a student's capability to put this understanding into practice. The stenography lab has questions that are designed to have the student actually perform deciphering a file using their understanding of stenography. The questions use various forms of stenography to test the student's capability. • Stenography is a Cybrary course intended for students of intermediate level. Stenography teaches the art of finding messages, files, images, etc hidden in other files or media and is targeted toward Forensic Analysts, Cyber Security Professionals, and Threat Analysts. Upon successful completion of Stenography, the student will be able to know how and where to look for hidden data, identify the concealed content, and be able to articulate the processes of masking such data. Stenography takes 1-2 hours to complete. • In Cydefe’s Stenography course students will learn about how and where to look for hidden data. This skill is a key part of the Forensics Analyst work role and builds to the ability to quickly and affectingly find hidden content. In Cydefe's Stenography course students will learn how to identify the concealed content. This skill is a key part of the Cyber Security Professional's role and builds to the ability to interpret the content found to form a more meaningful description and painting a broader picture. In Cydefe's Stenography course students will learn to articulate the processes of masking data. This is a key role part of the Threat Analyst work role and builds to the ability to know how and why the content was masked to better protect against an aggressor. • Stenography is part of Cyber Security. Completion of Stenography means that the student has learned/demonstrated the ability to know how and where to look for hidden data, identify the concealed content, and be able to articulate the processes of masking such data.