Get started

By signing up, you agree to our Terms of Use and Privacy Policy.
Reset your password
Enter your email and we'll send you instructions on how to reset your password.

Online programs to help you Stay Skilled, and Stay Ahead

Earn more than your peers.
Learn How.

By submitting, you agree to our Terms of Use and Privacy Policy.
checkmark

Thank you

One of our counsellors will get in touch with you soon!

Earn more than your peers. Learn How

Earn more than your peers.
Learn How.

By submitting, you agree to our Terms of Use and Privacy Policy.
checkmark

Thank you

One of our counsellors will get in touch with you soon!

Ethical Hacking

Covering Tracks

Once an attacker finishes his work, he wants to erase all tracks leading the investigators tracing back to him. This can be done using

  1. Disable auditing.

  2. Clearing logs.

  3. Modifying logs, registry files.

  4. Removing all files, folders created.


0 Comments

Add Comment

Subject to Moderate