This Course is part of a Career Path: Become a Penetration Tester
Module 1: Stealth Techniques for Incident Handlers
In Stealth Techniques for Incident Handlers, Cybrary Master Instructor Ken Underhill discusses the various techniques used around stealth like timestomping, steganography, logs, and covert channels, like Loki and 007Shell. Ken then dives into more detail with some walkthrough examples using the steganography tool, QuickCrypto.
Certificate of Completion
Complete this entire course to earn a Stealth Techniques for Incident Handlers Certificate of Completion
See the full benefits of our immersive learning experience with interactive courses and guided career paths.