CEH v11: Steganography & Avoiding Detection

Ethical Hacker v11    |    Intermediate
  • 2 videos | 42m 49s
  • Includes Assessment
  • Earns a Badge
Rating 4.4 of 22 users Rating 4.4 of 22 users (22)
Exfiltration of sensitive data is a common goal of many hacks. In this course, you'll explore how hackers are able to avoid detection when exfiltrating data by using steganography techniques and tools. On average it takes roughly nine months before a breach is detected. You'll also examine common tactics attackers use to cover their tracks and avoid detection by administrators. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.

WHAT YOU WILL LEARN

  • Recognize how to exfiltrate data by using steganography techniques and tools
    describe how to hide data in a file using steganography tools
    recognize how to detect steganography using steganalysis
    Recognize tactics attackers use to hide their activities from logs and auditing
  • recognize tools used by attackers to avoid detection by administrators
    identify tools attackers use to cover their tracks
    describe techniques that can hide logs or the tracks of an attacker

IN THIS COURSE

  • Locked
    1.  Steganography Tools and Techniques
    19m 10s
    After completing this video, you will be able to recognize how to exfiltrate data by using steganography techniques and tools. FREE ACCESS
  • Locked
    2.  Covering Your Tracks
    23m 39s
    After completing this video, you will be able to describe techniques that can hide logs or the tracks of an attacker. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.8 of 30 users Rating 4.8 of 30 users (30)
Rating 4.7 of 23 users Rating 4.7 of 23 users (23)
Rating 4.6 of 35 users Rating 4.6 of 35 users (35)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 25 users Rating 4.6 of 25 users (25)
Rating 4.5 of 23 users Rating 4.5 of 23 users (23)
Rating 4.7 of 15 users Rating 4.7 of 15 users (15)