YoVDO

Ethical Hacking: System Hacking

Offered By: LinkedIn Learning

Tags

Ethical Hacking Courses Password Cracking Courses Steganography Courses Privilege Escalation Courses Spyware Courses Keylogger Courses Rootkits Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Dive into ethical hacking, including gaining access, spyware, effective countermeasures, and more. This course maps to the System Hacking competency from the CEH Body of Knowledge.

Syllabus

Introduction
  • Hacking the system
  • Getting the most out of this course
  • Hacking ethically
1. Understanding System Hacking
  • Setting the stage
  • Getting a foothold
  • Authenticating a user
  • Challenge: Reviewing Entra ID authentication methods
  • Solution: Reviewing Entra ID authentication methods
2. Gaining Access
  • Acquiring passwords
  • Discovering password tools
  • Cracking passwords
  • Employing rainbow tables
  • Defending against password attacks
3. Exploiting Vulnerabilities
  • Leveraging security flaws
  • Overflowing the buffer
  • Enhancing software security
4. Escalating Privileges
  • Understanding privilege escalation
  • Obtaining administrator privileges
  • Defending against privilege escalation
5. Maintaining Access
  • Dissecting rootkits
  • User Mode and Kernel Mode
  • Using rootkits
  • Detect, remove, and avoid rootkits
6. Grasping Keyloggers
  • Outlining keystroke loggers
  • Protecting against keylogging
7. Recognizing Spyware
  • Explaining spyware behavior
  • Mobile spyware and invasive apps
  • Defending against spyware
8. Hiding in Plain Sight
  • Using steganography
  • Swimming in the NTFS data stream
  • Using whitespace steganography
  • Detecting steganography
9. Maintaining Persistence
  • Remaining in the system
  • Staying under the radar
  • Defend against persistence attacks
10. Covering Tracks
  • Disabling logging and hiding files
  • Outlining ways to cover your tracks
  • Summarize the course and what's next

Taught by

Lisa Bock

Related Courses

Certified Ethical Hacker (CEH) - Linux Academy's Prep Course
A Cloud Guru
Fundamentals of Computer Network Security
University of Colorado System via Coursera
Penetration Testing and Ethical Hacking
Cybrary
Ethical Hacking Course Certification
Cybrary
Password Cracking 101
Cybrary