Discover how attackers target your networks and evasion methods they may use. Buffer overflow, malware, port scanning, host profiling, encryption and tunneling, resource exhaustion, traffic fragmentation, and pivot attacks are covered.
Learning Objectives
SECFND: Attacks and Evasion
- describe endpoint attacks and how buffer overflows, malware, rootkits, port scanning, and host profiling are used to attack an endpoint
- describe evasion methods that attackers can use to avoid detection like tunneling, protocol misinterpretation, and traffic substitution
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):
Specialty Areas
- Cyber Defense Infrastructure Support
- Cybersecurity Management
- Network Services
Feedback
If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.