Ethical Hacking: System Hacking
Offered By: Pluralsight
Course Description
Overview
Pluralsight is not an official partner or accredited training center of
EC-Council. You've done your homework; now it's time to totally and completely "pwn" your target and yet make no one the wiser that you've made it in.
Pluralsight is not an official partner or accredited training center of EC-Council. This is what it all comes down to. After we've done our research, we've found our target, and identified its services, shares, users and resources, it’s time to take total and complete control of this box. In turn, we then use this box to repeat our efforts to pwn more boxes within the network as well as grab any intellectual property that could be of great worth. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking
Topics:
Pluralsight is not an official partner or accredited training center of EC-Council. This is what it all comes down to. After we've done our research, we've found our target, and identified its services, shares, users and resources, it’s time to take total and complete control of this box. In turn, we then use this box to repeat our efforts to pwn more boxes within the network as well as grab any intellectual property that could be of great worth. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking
Topics:
- Understanding This Stage
- Phase 1: Gaining Access – Cracking Passwords
- More Cracking
- Phase 2: Gaining Access – Escalating Privileges
- Phase 3: Maintaining Access – Executing Applications
- Phase 4: Maintaining Access – Hiding Your Tools
- Phase 5: Covering Your Tracks - Clearing Logs and Evidence
Taught by
Dale Meredith
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network