YoVDO

Ethical Hacking: System Hacking

Offered By: Pluralsight

Tags

Ethical Hacking Courses Cybersecurity Courses Password Cracking Courses Privilege Escalation Courses Log Management Courses

Course Description

Overview

Pluralsight is not an official partner or accredited training center of EC-Council. You've done your homework; now it's time to totally and completely "pwn" your target and yet make no one the wiser that you've made it in.

Pluralsight is not an official partner or accredited training center of EC-Council. This is what it all comes down to. After we've done our research, we've found our target, and identified its services, shares, users and resources, it’s time to take total and complete control of this box. In turn, we then use this box to repeat our efforts to pwn more boxes within the network as well as grab any intellectual property that could be of great worth. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking

Topics:
  • Understanding This Stage
  • Phase 1: Gaining Access – Cracking Passwords
  • More Cracking
  • Phase 2: Gaining Access – Escalating Privileges
  • Phase 3: Maintaining Access – Executing Applications
  • Phase 4: Maintaining Access – Hiding Your Tools
  • Phase 5: Covering Your Tracks - Clearing Logs and Evidence

Taught by

Dale Meredith

Related Courses

Deploy and Manage Your Application on Alibaba Cloud
Alibaba via Coursera
Introduction to Amazon CloudWatch Logs
Amazon Web Services via AWS Skill Builder
Learning Splunk
LinkedIn Learning
Managing Logs, Errors and Application Performance Using Google Stackdriver
Pluralsight
Introduction to Amazon CloudWatch Logs
Pluralsight