5910 Breckenridge Pkwy Suite B, Tampa, FL. 33610
(800) 272-0707

SkillSoft Explore Course

Certification     EC-Council     Certified Ethical Hacker (CEH)     Certified Ethical Hacker v10

Discover the necessity of hiding files and the use of alternate data streams and steganography as tactics for hiding information. Explore how to cover tracks after breaching a system, including disabling auditing systems and clearing logs.



Objectives

CEHv10: Hidden Files and Covering Tracks

  • describe why hiding files is necessary and show the use of alternate data streams and steganography as tactics for hiding information
  • describe the concept of covering your tracks after you've breached a system, including how to remove traces of your activities by disabling auditing systems and clearing logs