Evasion is the process of avoiding detection by defensive security controls during an engagement. This skill path is designed to provide you with a general understanding of Evasion in the context of a Penetration Tester work role. Upon completing the skill path, you will earn a Credly digital badge that will demonstrate to employers that you’re ready for the job.

Learners at 96% of Fortune 1000 companies trust Cybrary
Evasion is the process of avoiding detection by defensive security controls during an engagement. This skill path is designed to provide you with a general understanding of Evasion in the context of a Penetration Tester work role.
In this skill path, you will learn the basics of Evasion for Penetration Testers, Identifying Ingress and Egress Rules, Evading Microsoft Defender Antivirus, and Bypassing Web Application Firewalls.
Completing this skill path and the associated Assessment will prepare you for pursuing a career as a Penetration Tester. Upon completing this skill path, you are encouraged to enroll in the complete Penetration Tester career path.
The Incident Response Skill Path is expected to release in Q2 of 2025. Sign up now to explore our other Incident Response courses and content.
Start Learning for FreeLearn core concepts and get hands-on with key skills.
In this course, you will learn the basics of evasion in the context of penetration testing. You will learn common evasion techniques and tools for networks, hosts, and applications.
In this hands-on lab, you will learn the basics of identifying ingress and egress rules on a firewall. You will practice using Nmap to probe a live firewall in a simulated network environment and gather information about its rule configuration.
In this hands-on lab, you will learn about evading Microsoft Defender. You will practice using process injection and obfuscation techniques to evade Microsoft Defender.
In this hands-on lab, you will learn about Web Application Firewalls (WAF) and common techniques for bypassing them. You will practice using manual testing techniques to bypass various WAF configurations.
Exercise your problem-solving and creative thinking skills with security-centric puzzles
In this hands-on challenge, you will practice making changes to a malware sample in order to evade Microsoft Defender.
In this hands-on challenge, you will practice identifying potential egress points through intermediate devices and creating tunnels out of a network.
Assess your knowledge and skills to identify areas for improvement and measure your growth
In this course, you will learn the basics of evasion in the context of penetration testing. You will learn common evasion techniques and tools for networks, hosts, and applications.
Cybrary’s expert-led cybersecurity courses help your team remediate skill gaps and get up-to-date on certifications. Utilize Cybrary to stay ahead of emerging threats and provide team members with clarity on how to learn, grow, and advance their careers within your organization.


Put your skills to the test in virtual labs, challenges, and simulated environments.

Track your skills development from lesson to lesson using the Cybrary Skills Tracker.
.webp)
Connect with peers and mentors through our supportive community of cybersecurity professionals.