Courses
Stealth Techniques for Incident Handlers
In Stealth Techniques for Incident Handlers, Cybrary Master Instructor Ken Underhill discusses the various techniques used around stealth like timestomping, steganography, logs, and covert channels, like Loki and 007Shell. Ken then dives into more detail with some walkthrough examples using the steganography tool, QuickCrypto.
Evasion for Incident Handlers
As a defender, you need to understand your adversary. In this Evasion for Incident Handlers course, Ken Underhill gives a high-level overview of how bad actors circumvent antivirus and anti-malware software and use techniques like encryption, separation, and ghostwriting to evade detection. Catch them in the act by understanding how they operate.
Scanning and Enumeration with NMAP
NMAP is a powerful tool used by both attackers and defenders to scan networks. In this Scanning and Enumeration with NMAP course, Ken Underhill uses an NMAP lab to demonstrate the process for collecting information on a network using technical tools. Become a more advanced incident handler with this course.
Online Reconnaissance
If you’re on the path to becoming an incident handler, you’ll need reconnaissance skills. In this Online Reconnaissance course, Ken Underhill covers the gathering of data through reconnaissance-related labs, with a primary focus on open-source intelligence (OSINT). Examine analysis labs to give you a hands-on overview of information gathering.
Introduction to IT & Cybersecurity
Are you new to IT & cybersecurity and wondering which role might suit you best? In this cybersecurity for beginners overview, we cover the roles of Network Administrator, Incident Responder, System Administrator, Penetration Tester, Cloud Engineer, Cybersecurity Manager, and Privacy Analyst. Find the role for you in this exciting field.
Fundamentals of Vulnerability Management
Get an introduction to protecting your network with this Fundamentals of Vulnerability Management training. Ken Underhill explains how to use automation to manage vulnerabilities and goes over the vulnerability management lifecycle. You’ll walk away with a solid framework and understanding of different types of vulnerabilities and assessments.
Social Engineering
Do you have what it takes to learn the art of social engineering, or master manipulation in cybersecurity? This social engineering course is essential for any aspiring penetration tester. Learn about different types of social engineering attacks and gain hands-on experience in two labs using the Social Engineering Toolkit (SET).
Malware Threats
Interested in penetration testing and malware analysis? This malware course introduces you to different types of malware, like viruses, worms, and Trojans. Gain hands-on experience in analyzing malicious files, identifying malicious processes, and more.
Sniffing
This course covers basic sniffing as part of a penetration test. Attackers and penetration testers use sniffing to analyze network packets for information.
Computer Hacking and Forensics
If you love the idea of doing digital forensics investigations to catch cybercriminals and want to earn your CHFI certification, this course is for you. Learn how to detect online criminal activity, gather evidence, and recover deleted data. Prepare for the EC Council’s CHFI certification and be ready to fill jobs that are in high demand.
I'm a cybersecurity professional who has worked primarily in healthcare and as an adjunct professor of digital forensics. I have been instructing online for several years, primarily in business and health-related areas. I hold both the CEH (Certified Ethical Hacker)and CHFI (Computer Hacking Forensic Investigator) certifications from EC-Council and am a content reviewer/writer for both exams (no, I can’t give you the answer key lol). I began helping other professionals pass the CHFI exam after struggling in my first exam attempt. To date, I have helped tens of thousands of people around the world pass the CEH and CHFI exams.