Ethical Hacking: System Hacking
Offered By: LinkedIn Learning
Course Description
Overview
Learn to detect, prevent, and counter system hacking, including password cracking, privilege escalation, spyware, and keylogging, and study for the Certified Ethical Hacker exam.
Syllabus
Introduction
- Welcome
- What you should know
- Hacking ethically
- Setting the stage
- Hacking goals
- Authenticate a user
- Challenge: Reviewing Azure authentication methods
- Challenge: Reviewing Azure authentication methods
- Acquiring passwords
- Password cracking techniques
- Generating rainbow tables
- Defend against password attacks
- Privilege escalation overview
- Obtaining administrator privileges
- Executing applications
- Defending against privilege escalation
- Spyware overview
- Spyware types
- Capturing screen activity
- Spyware on a cell phone
- Defend against spyware
- Compare keystroke loggers
- Using a keystroke logger
- Methodology of keystroke logging
- Keystroke loggers for macOS
- Protect against keylogging
- Swimming in the NTFS data stream
- Using steganography
- Understanding steganography
- Using whitespace steganography
- Hide a message with steganography
- Detecting steganography
- Disable logging and hide files
- Outlining ways to cover your tracks
- Next steps
Taught by
Lisa Bock
Related Courses
Advanced Python Scripting for CybersecurityInfosec via Coursera Python for Command-and-control, Exfiltration and Impact
Infosec via Coursera Fundamentos del Internet de las cosas (IoT): Seguridad I
Galileo University via edX MSc Cyber Security
Coventry University via FutureLearn Cyber Incident Response
Infosec via Coursera