CEH v12: Steganography and Avoiding Detection

placeholder

Exfiltration of sensitive data is a common goal of many hacks.

In this course you;ll explore how hackers are able to avoid detection when exfiltrating data by using steganography techniques and tools. On average it takes roughly nine months before a breach is detected. You;ll also examine common tactics attackers use to cover their tracks and avoid detection by administrators.

This course is one in a series that helps to prepare you for the Certified Ethical Hacker v12 (312-50) exam.