YoVDO

Ethical Hacking: System Hacking

Offered By: Pluralsight

Tags

Ethical Hacking Courses Cybersecurity Courses Password Cracking Courses Privilege Escalation Courses Log Management Courses

Course Description

Overview

Pluralsight is not an official partner or accredited training center of EC-Council. You've done your homework; now it's time to totally and completely "pwn" your target and yet make no one the wiser that you've made it in.

Pluralsight is not an official partner or accredited training center of EC-Council. This is what it all comes down to. After we've done our research, we've found our target, and identified its services, shares, users and resources, it’s time to take total and complete control of this box. In turn, we then use this box to repeat our efforts to pwn more boxes within the network as well as grab any intellectual property that could be of great worth. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking

Topics:
  • Understanding This Stage
  • Phase 1: Gaining Access – Cracking Passwords
  • More Cracking
  • Phase 2: Gaining Access – Escalating Privileges
  • Phase 3: Maintaining Access – Executing Applications
  • Phase 4: Maintaining Access – Hiding Your Tools
  • Phase 5: Covering Your Tracks - Clearing Logs and Evidence

Taught by

Dale Meredith

Related Courses

Network Security
Rochester Institute of Technology via edX
Fundamentals of Computer Network Security
University of Colorado System via Coursera
The Complete Ethical Hacking Course for 2016/2017!
Udemy
Master in Wi-Fi ethical Hacking
Udemy
Network Hacking Continued - Intermediate to Advanced
Udemy