Stealth Techniques for Incident Handlers
In Stealth Techniques for Incident Handlers, Cybrary Master Instructor Ken Underhill discusses the various techniques used around stealth like timestomping, steganography, logs, and covert channels, like Loki and 007Shell. Ken then dives into more detail with some walkthrough examples using the steganography tool, QuickCrypto.
Already have an account? Sign In »

This Course is part of a Career Path:
Become an Incident HandlerModule 1: Stealth Techniques for Incident Handlers
In Stealth Techniques for Incident Handlers, Cybrary Master Instructor Ken Underhill discusses the various techniques used around stealth like timestomping, steganography, logs, and covert channels, like Loki and 007Shell. Ken then dives into more detail with some walkthrough examples using the steganography tool, QuickCrypto.

Ken Underhill


Complete this entire course to earn a Stealth Techniques for Incident Handlers Certificate of Completion
See the full benefits of our immersive learning experience with interactive courses and guided career paths.