Evasion for Incident Handlers

As a defender, you need to understand your adversary. In this Evasion for Incident Handlers course, Ken Underhill gives a high-level overview of how bad actors circumvent antivirus and anti-malware software and use techniques like encryption, separation, and ghostwriting to evade detection. Catch them in the act by understanding how they operate.

Time
5 minutes
Difficulty
Intermediate
5.0
Share
NEED TO TRAIN YOUR TEAM? LEARN MORE
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

This Course is part of a Career Path: Become an Incident Handler
Course Content
Course Description

In Evasion for Incident Handlers, Ken Underhill gives a high-level overview of the various evasion techniques around circumventing antivirus or anti-malware software. Techniques like encryption, separation, and ghostwriting are discussed along with other related tools that are needed for this skill.

Instructed By
Ken Underhill

Ken Underhill

Senior Instructor
Provider
Cybrary
Certificate of Completion
Certificate Of Completion

Complete this entire course to earn a Evasion for Incident Handlers Certificate of Completion

Comprehensive Learning

See the full benefits of our immersive learning experience with interactive courses and guided career paths.