• Online, Self-Paced
Course Description

Discover the necessity of hiding files and the use of alternate data streams and steganography as tactics for hiding information. Explore how to cover tracks after breaching a system, including disabling auditing systems and clearing logs.

Learning Objectives

CEHv10: Hidden Files and Covering Tracks

  • describe why hiding files is necessary and show the use of alternate data streams and steganography as tactics for hiding information
  • describe the concept of covering your tracks after you've breached a system, including how to remove traces of your activities by disabling auditing systems and clearing logs

 

Framework Connections