IT Professional Curricula Internet and Network Technologies Solution Area Security Solutions Certified Ethical Hacker (CEH) v10 (Update)
Discover how alternate data streams and steganography serve as tactics to hide information. Explore how to cover tracks after a system breach, including disabling auditing systems and clearing logs. This course helps prepare for the 312-50: Certified Ethical Hacker v10 exam. Watch these videos and learn how to execute a command to create an alternate data stream. Recall a command to create a symbolic link to a file. Show techniques to cover your tracks. Identify valid options for the AuditPol command.
Objectives |
---|
Certified Ethical Hacker - CEHv10: Hidden Files and Covering Tracks
|