Ethical Hacker: Hidden Files & Covering Tracks
Ethical Hacker 10
| Intermediate
- 2 Videos | 48m 4s
- Includes Assessment
- Earns a Badge
Discover how alternate data streams and steganography serve as tactics to hide information. Explore how to cover tracks after a system breach, including disabling auditing systems and clearing logs. This course helps prepare for the 312-50: Certified Ethical Hacker v10 exam. Watch these videos and learn how to execute a command to create an alternate data stream. Recall a command to create a symbolic link to a file. Show techniques to cover your tracks. Identify valid options for the AuditPol command.
WHAT YOU WILL LEARN
-
identify the command to create an alternate data streamidentify the command to create a symbolic link to a file
-
identify methods for covering your tracksidentify valid options for the AuditPol command
IN THIS COURSE
-
1.Hidden Files24m 54s
-
2.Covering Tracks23m 11s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform
Digital badges are yours to keep, forever.