CEH v12: Steganography and Avoiding Detection
CEH v12
| Intermediate
- 2 videos | 46m 47s
- Includes Assessment
- Earns a Badge
Exfiltration of sensitive data is a common goal of many hacks. In this course, you'll explore how hackers are able to avoid detection when exfiltrating data by using steganography techniques and tools. On average it takes roughly nine months before a breach is detected. You'll also examine common tactics attackers use to cover their tracks and avoid detection by administrators. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v12 (312-50) exam.
WHAT YOU WILL LEARN
-
Recognize how to exfiltrate data by using steganography techniques and toolsdescribe how to hide data in a file using steganography toolsrecognize how to detect steganography using steganalysisRecognize tactics attackers use to hide their activities from logs and auditing
-
identify tools attackers use to cover their tracksdescribe techniques that can hide logs or the tracks of an attackerrecognize tools used by attackers to avoid detection by administrators
IN THIS COURSE
-
24m 35sUpon completion of this video, you will be able to recognize how hackers are able to avoid detection when exfiltrating data by using steganography techniques and tools. FREE ACCESS
-
22m 13sAfter completing this video, you will be able to recognize common tactics attackers use to cover their tracks so they can avoid detection by administrators. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.