Free
Evasion for Incident Handlers
As a defender, you need to understand your adversary. In this Evasion for Incident Handlers course, Ken Underhill gives a high-level overview of how bad actors circumvent antivirus and anti-malware software and use techniques like encryption, separation, and ghostwriting to evade detection. Catch them in the act by understanding how they operate.
![](https://cdn.prod.website-files.com/63eef15e3ff8fd318e9a6888/6422fa83dbda4c850389c7bb_Group%20170.webp)
0
H
5
M
Time
intermediate
difficulty
0
ceu/cpe
Course Content
Evasion
Evasion for Incident Handlers
Course Description
In Evasion for Incident Handlers, Ken Underhill gives a high-level overview of the various evasion techniques around circumventing antivirus or anti-malware software. Techniques like encryption, separation, and ghostwriting are discussed along with other related tools that are needed for this skill.