MyPage is a personalized page based on your interests.The page is customized to help you to find content that matters you the most.


I'm not curious

Exploitation: Evading Detection and Bypassing Countermeasures

Course Summary

This course addresses one of the most commonly overlooked areas of the pen testing process, evasion and countermeasure bypass. This course shows you how to remain undetected and penetrate deeper into systems and networks for maximum effectiveness.


  • +

    Course Syllabus

    Course Overview
    - 1m 35s

    —Course Overview 1m 35s
    Evading Detection and Bypassing Countermeasures
    - 4m 55s

    —Evading Detection 4m 55s
    Remaining Anonymous
    - 25m 48s
    Bypassing Network Firewalls
    - 23m 0s
    Sneaking Past Intrusion Detection Systems and Honeypots
    - 46m 7s
    Circumventing Application Security Controls
    - 37m 31s
    Fooling Platform Controls
    - 36m 24s
    Outwitting Platform Memory Controls
    - 39m 29s
    Mapping Evasion Techniques to Kill Chains
    - 17m 29s


Course Fee:
USD 29

Course Type:

Self-Study

Course Status:

Active

Workload:

1 - 4 hours / week

Attended this course?

Back to Top

 
Awards & Accolades for MyTechLogy
Winner of
REDHERRING
Top 100 Asia
Finalist at SiTF Awards 2014 under the category Best Social & Community Product
Finalist at HR Vendor of the Year 2015 Awards under the category Best Learning Management System
Finalist at HR Vendor of the Year 2015 Awards under the category Best Talent Management Software
Hidden Image Url