Ethical Hacking: System Hacking
Offered By: LinkedIn Learning
Course Description
Overview
Dive into ethical hacking, including gaining access, spyware, effective countermeasures, and more. This course maps to the System Hacking competency from the CEH Body of Knowledge.
Syllabus
Introduction
- Hacking the system
- Getting the most out of this course
- Hacking ethically
- Setting the stage
- Getting a foothold
- Authenticating a user
- Challenge: Reviewing Entra ID authentication methods
- Solution: Reviewing Entra ID authentication methods
- Acquiring passwords
- Discovering password tools
- Cracking passwords
- Employing rainbow tables
- Defending against password attacks
- Leveraging security flaws
- Overflowing the buffer
- Enhancing software security
- Understanding privilege escalation
- Obtaining administrator privileges
- Defending against privilege escalation
- Dissecting rootkits
- User Mode and Kernel Mode
- Using rootkits
- Detect, remove, and avoid rootkits
- Outlining keystroke loggers
- Protecting against keylogging
- Explaining spyware behavior
- Mobile spyware and invasive apps
- Defending against spyware
- Using steganography
- Swimming in the NTFS data stream
- Using whitespace steganography
- Detecting steganography
- Remaining in the system
- Staying under the radar
- Defend against persistence attacks
- Disabling logging and hiding files
- Outlining ways to cover your tracks
- Summarize the course and what's next
Taught by
Lisa Bock
Related Courses
Методы и средства защиты информацииHigher School of Economics via Coursera Learn Ethical Hacking & Reverse Engineering
Udemy Ethical Hacking: System Hacking
LinkedIn Learning IT Surveillance and Computer Forensics from Scratch HACKING+
Udemy Kali Linux Tutorial in Hindi
YouTube