This course is for security professionals interested in learning how attackers use legitimate Unix binaries to bypass security measures.
Learning Objectives
Gain a skill
Framework Connections
Competency Areas
Work Roles
Feedback
If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.