This Course is part of a Career Path: Become an Incident Handler

Course Content

Module 1: Stealth Techniques for Incident Handlers

LEARN MORE. ACHIEVE MORE.

Follow A Path

Deciphering the essentials to enter a new career is hard, so we did it for you!

Focus on building your skills and take this course in a guided Career Path.

LEARN MORE. ACHIEVE MORE.

Follow A Path

Deciphering the essentials to enter a new career is hard, so we did it for you!

Focus on building your skills and take this course in a guided Career Path.

Course Description

In Stealth Techniques for Incident Handlers, Cybrary Master Instructor Ken Underhill discusses the various techniques used around stealth like timestomping, steganography, logs, and covert channels, like Loki and 007Shell. Ken then dives into more detail with some walkthrough examples using the steganography tool, QuickCrypto.

Instructed By

Instructor Profile Image
Ken Underhill
Master Instructor at Cybrary
Master Instructor

Provided By

Cybrary

Certificate of Completion

Certificate Of Completion

Complete this entire course to earn a Stealth Techniques for Incident Handlers Certificate of Completion

Comprehensive Learning

See the full benefits of our immersive learning experience with interactive courses and guided career paths.