CEH v11: Steganography & Avoiding Detection

placeholder

Exfiltration of sensitive data is a common goal of many hacks. In this course you;ll explore how hackers are able to avoid detection when exfiltrating data by using steganography techniques and tools. On average it takes roughly nine months before a breach is detected. You;ll also examine common tactics attackers use to cover their tracks and avoid detection by administrators. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.