Attacks and Persistence for Incident Handlers
Hone your incident handling skills by joining Ken Underhill in this Attacks and Persistence for Incident Handlers course. Identify DNS and USB attacks and walk through a session hijacking lab to understand how an attacker can exploit a session to harvest user credentials.
Already have an account? Sign In »

LEARN MORE. ACHIEVE MORE.
Deciphering the essentials to enter a new career is hard, so we did it for you!
Focus on building your skills and take this course in a guided Career Path.
Attacks and Persistence for Incident Handlers covers several different types of attacks, with a focus on DNS attacks and USB attacks. Ken Underhill also walks you through a session hijacking lab to simulate an attacker exploiting an established session to harvest user login credentials.



Complete this entire course to earn a Attacks and Persistence for Incident Handlers Certificate of Completion
See the full benefits of our immersive learning experience with interactive courses and guided career paths.