Ethical Hacking: System Hacking
Offered By: LinkedIn Learning
Course Description
Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Dive into ethical hacking, including gaining access, spyware, effective countermeasures, and more. This course maps to the System Hacking competency from the CEH Body of Knowledge.
Syllabus
Introduction
- Hacking the system
- Getting the most out of this course
- Hacking ethically
- Setting the stage
- Getting a foothold
- Authenticating a user
- Challenge: Reviewing Entra ID authentication methods
- Solution: Reviewing Entra ID authentication methods
- Acquiring passwords
- Discovering password tools
- Cracking passwords
- Employing rainbow tables
- Defending against password attacks
- Leveraging security flaws
- Overflowing the buffer
- Enhancing software security
- Understanding privilege escalation
- Obtaining administrator privileges
- Defending against privilege escalation
- Dissecting rootkits
- User Mode and Kernel Mode
- Using rootkits
- Detect, remove, and avoid rootkits
- Outlining keystroke loggers
- Protecting against keylogging
- Explaining spyware behavior
- Mobile spyware and invasive apps
- Defending against spyware
- Using steganography
- Swimming in the NTFS data stream
- Using whitespace steganography
- Detecting steganography
- Remaining in the system
- Staying under the radar
- Defend against persistence attacks
- Disabling logging and hiding files
- Outlining ways to cover your tracks
- Summarize the course and what's next
Taught by
Lisa Bock
Related Courses
Certified Ethical Hacker (CEH) - Linux Academy's Prep CourseA Cloud Guru Fundamentals of Computer Network Security
University of Colorado System via Coursera Penetration Testing and Ethical Hacking
Cybrary Ethical Hacking Course Certification
Cybrary Password Cracking 101
Cybrary