Eben Jansen
Skillsoft issued completion badges are earned based on viewing the percentage required or receiving a passing score when assessment is required. Discover how alternate data streams and steganography serve as tactics to hide information. Explore how to cover tracks after a system breach, including disabling auditing systems and clearing logs. This course helps prepare for the 312-50: Certified Ethical Hacker v10 exam. Watch these videos and learn how to execute a command to create an alternate data stream. Recall a command to create a symbolic link to a file. Show techniques to cover your tracks. Identify valid options for the AuditPol command.
Issued on
April 15, 2024
Expires on
Does not expire