Evasion for Incident Handlers
As a defender, you need to understand your adversary. In this Evasion for Incident Handlers course, Ken Underhill gives a high-level overview of how bad actors circumvent antivirus and anti-malware software and use techniques like encryption, separation, and ghostwriting to evade detection. Catch them in the act by understanding how they operate.
In Evasion for Incident Handlers, Ken Underhill gives a high-level overview of the various evasion techniques around circumventing antivirus or anti-malware software. Techniques like encryption, separation, and ghostwriting are discussed along with other related tools that are needed for this skill.
Complete this entire course to earn a Evasion for Incident Handlers Certificate of Completion
See the full benefits of our immersive learning experience with interactive courses and guided career paths.
In Stealth Techniques for Incident Handlers, Cybrary Master Instructor Ken Underhill discusses the various techniques ...
An important but often overlooked process in incident handling is memory analysis. In this installment ...