Course contentsShow
Security
Lesson 2126 of 3,05242. Penetration Testing and Red TeamingPro lesson

Covering Tracks and Anti-Forensics

Log manipulation, timestamp modification, file deletion, and other techniques to hide post-exploitation activities.

This lesson is for subscribers

You've completed the free preview. Subscribe to unlock every lesson in every course.