Hone your incident handling skills by joining Ken Underhill in this Attacks and Persistence for Incident Handlers course. Identify DNS and USB attacks and walk through a session hijacking lab to understand how an attacker can exploit a session to harvest user credentials.