• Online, Self-Paced
Course Description

Discover how attackers target your networks and evasion methods they may use. Buffer overflow, malware, port scanning, host profiling, encryption and tunneling, resource exhaustion, traffic fragmentation, and pivot attacks are covered.

Learning Objectives

SECFND: Attacks and Evasion

  • describe endpoint attacks and how buffer overflows, malware, rootkits, port scanning, and host profiling are used to attack an endpoint
  • describe evasion methods that attackers can use to avoid detection like tunneling, protocol misinterpretation, and traffic substitution

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Cyber Defense Infrastructure Support
  • Cybersecurity Management
  • Network Services

Feedback

If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.