Stealth Techniques for Incident Handlers
In Stealth Techniques for Incident Handlers, Cybrary Master Instructor Ken Underhill discusses the various techniques used around stealth like timestomping, steganography, logs, and covert channels, like Loki and 007Shell. Ken then dives into more detail with some walkthrough examples using the steganography tool, QuickCrypto.
Already have an account? Sign In »

LEARN MORE. ACHIEVE MORE.
Deciphering the essentials to enter a new career is hard, so we did it for you!
Focus on building your skills and take this course in a guided Career Path.
In Stealth Techniques for Incident Handlers, Cybrary Master Instructor Ken Underhill discusses the various techniques used around stealth like timestomping, steganography, logs, and covert channels, like Loki and 007Shell. Ken then dives into more detail with some walkthrough examples using the steganography tool, QuickCrypto.



Complete this entire course to earn a Stealth Techniques for Incident Handlers Certificate of Completion
See the full benefits of our immersive learning experience with interactive courses and guided career paths.