Ethical Hacker: Hidden Files & Covering Tracks
Ethical Hacker 10
| Intermediate
- 2 videos | 48m 4s
- Includes Assessment
- Earns a Badge
Discover how alternate data streams and steganography serve as tactics to hide information. Explore how to cover tracks after a system breach, including disabling auditing systems and clearing logs. This course helps prepare for the 312-50: Certified Ethical Hacker v10 exam. Watch these videos and learn how to execute a command to create an alternate data stream. Recall a command to create a symbolic link to a file. Show techniques to cover your tracks. Identify valid options for the AuditPol command.
WHAT YOU WILL LEARN
-
Identify the command to create an alternate data streamidentify the command to create a symbolic link to a file
-
Identify methods for covering your tracksidentify valid options for the auditpol command
IN THIS COURSE
-
24m 54s
-
23m 11s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.