YoVDO

Ethical Hacking: System Hacking

Offered By: Pluralsight

Tags

Ethical Hacking Courses Cybersecurity Courses Password Cracking Courses Privilege Escalation Courses Log Management Courses

Course Description

Overview

Pluralsight is not an official partner or accredited training center of EC-Council. You've done your homework; now it's time to totally and completely "pwn" your target and yet make no one the wiser that you've made it in.

Pluralsight is not an official partner or accredited training center of EC-Council. This is what it all comes down to. After we've done our research, we've found our target, and identified its services, shares, users and resources, it’s time to take total and complete control of this box. In turn, we then use this box to repeat our efforts to pwn more boxes within the network as well as grab any intellectual property that could be of great worth. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking

Topics:
  • Understanding This Stage
  • Phase 1: Gaining Access – Cracking Passwords
  • More Cracking
  • Phase 2: Gaining Access – Escalating Privileges
  • Phase 3: Maintaining Access – Executing Applications
  • Phase 4: Maintaining Access – Hiding Your Tools
  • Phase 5: Covering Your Tracks - Clearing Logs and Evidence

Taught by

Dale Meredith

Related Courses

Ethical Hacking
Indian Institute of Technology, Kharagpur via Swayam
Investigación en Informática Forense y Ciberderecho
University of Extremadura via Miríadax
MSc Cyber Security
Coventry University via FutureLearn
Network Security - Introduction to Network Security
New York University (NYU) via edX
Network Security - Advanced Topics
New York University (NYU) via edX