Evasion for Incident Handlers
As a defender, you need to understand your adversary. In this Evasion for Incident Handlers course, Ken Underhill gives a high-level overview of how bad actors circumvent antivirus and anti-malware software and use techniques like encryption, separation, and ghostwriting to evade detection. Catch them in the act by understanding how they operate.
Already have an account? Sign In »
Module 1: Evasion for Incident Handlers
In Evasion for Incident Handlers, Ken Underhill gives a high-level overview of the various evasion techniques around circumventing antivirus or anti-malware software. Techniques like encryption, separation, and ghostwriting are discussed along with other related tools that are needed for this skill.
Complete this entire course to earn a Evasion for Incident Handlers Certificate of Completion
See the full benefits of our immersive learning experience with interactive courses and guided career paths.