OpenText Course Completion - Host Intrusion Methodology and Investigation
Issued by
OpenText
This course instructs the attendees about the methodology of host intrusions and the forensic artifacts left behind.
Additional DetailsSkills
- Analyzing Compromised Systems
- Conducting Reconnaissance Activities
- Escalating Prvileges
- Establishing Viable Methodologies
- Hiding Data
- Phishing Activities
- Triaging Live Host
Earning Criteria
-
Attended and completed Host Intrusion Methodology and Investigation