• Online, Self-Paced

Learning Objectives

Understand how an adversary can use the Exfiltration Over Alternative Protocol: Asymmetric Encrypted Non-C2 Protocol TTP to further their objectives in a cyber operation.

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Competency Areas