Certified Ethical Hacker - CEHv10: Hidden Files and Covering Tracks


Overview/Description
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description
Discover how alternate data streams and steganography serve as tactics to hide information. Explore how to cover tracks after a system breach, including disabling auditing systems and clearing logs. This course helps prepare for the 312-50: Certified Ethical Hacker v10 exam. Watch these videos and learn how to execute a command to create an alternate data stream. Recall a command to create a symbolic link to a file. Show techniques to cover your tracks. Identify valid options for the AuditPol command.

Expected Duration (hours)
0.8

Lesson Objectives

Certified Ethical Hacker - CEHv10: Hidden Files and Covering Tracks

  • identify the command to create an alternate data stream
  • identify the command to create a symbolic link to a file
  • identify methods for covering your tracks
  • identify valid options for the AuditPol command
  • Course Number:
    it_spceh10tv_14_06_enus

    Expertise Level
    Intermediate