5910 Breckenridge Pkwy Suite B, Tampa, FL. 33610
(800) 272-0707

SkillSoft Explore Course

Certification     EC-Council     Certified Ethical Hacker (CEH)     Certified Ethical Hacker (CEH) v11

Exfiltration of sensitive data is a common goal of many hacks. In this course, you'll explore how hackers are able to avoid detection when exfiltrating data by using steganography techniques and tools. On average it takes roughly nine months before a breach is detected. You'll also examine common tactics attackers use to cover their tracks and avoid detection by administrators. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.



Objectives

CEH v11: Steganography & Avoiding Detection

  • describe how to hide data in a file using steganography tools
  • recognize how to detect steganography using steganalysis
  • recognize how to exfiltrate data by using steganography techniques and tools
  • describe techniques that can hide logs or the tracks of an attacker
  • identify tools attackers use to cover their tracks
  • recognize tactics attackers use to hide their activities from logs and auditing
  • recognize tools used by attackers to avoid detection by administrators