• Online, Self-Paced
Course Description

This course is for security professionals interested in learning how attackers use legitimate Unix binaries to bypass security measures.

Learning Objectives

Gain a skill

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):