Evasion for Incident Handlers

0
Language

Level

Beginner

Access

Paid

Certificate

Paid

As a defender, you need to understand your adversary. In this Evasion for Incident Handlers course, Ken Underhill gives a high-level overview of how bad actors circumvent antivirus and anti-malware software and use techniques like encryption, separation, and ghostwriting to evade detection. Catch them in the act by understanding how they operate.

Add your review

Course Description

In Evasion for Incident Handlers, Ken Underhill gives a high-level overview of the various evasion techniques around circumventing antivirus or anti-malware software. Techniques like encryption, separation, and ghostwriting are discussed along with other related tools that are needed for this skill.

In Evasion for Incident Handlers, Ken Underhill gives a high-level overview of the various evasion techniques around circumventing antivirus or anti-malware software. Techniques like encryption, separation, and ghostwriting are discussed along with other related tools that are needed for this skill.

Module 1: Evasion for Incident Handlers

User Reviews

0.0 out of 5
0
0
0
0
0
Write a review

There are no reviews yet.

Be the first to review “Evasion for Incident Handlers”

×

    Your Email (required)

    Report this page
    Evasion for Incident Handlers
    Evasion for Incident Handlers
    LiveTalent.org
    Logo
    LiveTalent.org
    Privacy Overview

    This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.