Certification EC-Council Certified Ethical Hacker (CEH) Certified Ethical Hacker (CEH) v11
Exfiltration of sensitive data is a common goal of many hacks. In this course, you'll explore how hackers are able to avoid detection when exfiltrating data by using steganography techniques and tools. On average it takes roughly nine months before a breach is detected. You'll also examine common tactics attackers use to cover their tracks and avoid detection by administrators. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.
Objectives |
---|
CEH v11: Steganography & Avoiding Detection
|