Exploiting Host-based Vulnerabilities for CompTIA PenTest+
Offered By: Pluralsight
Course Description
Overview
Many exploits are aimed at server and workstation operating systems. Once you have compromised the network, you will want to zero in on specific hosts and their applications. Understanding how hosts are configured and what they might include within themselves will help any security professional. This course will prepare you to exploits hosts in any engagement.
Network services aren't the only source of vulnerability for an organization. In this course, Exploiting Hosts-based Vulnerabilities for CompTIA PenTest+, you will gain the ability to engage and exploit different host targets during an engagement. First, you will learn the commonalities that all Windows hosts have with each other as well as a different distrobution of Linux hold in common. Once you understand this, you'll be able to utilize this knowledge to your advantage. Next, you will discover that similar OS also offers up services, protocols and even some built-in account that make them extremely attractive to attack. Finally, you will explore how default configurations and setting can haunt an organization when it comes to attackers gaining access to resources that are in some cases mission critical. When you are finished with this course, you will have the skills and knowledge of penetration tester needed to exploit hosts on any engagement.
Network services aren't the only source of vulnerability for an organization. In this course, Exploiting Hosts-based Vulnerabilities for CompTIA PenTest+, you will gain the ability to engage and exploit different host targets during an engagement. First, you will learn the commonalities that all Windows hosts have with each other as well as a different distrobution of Linux hold in common. Once you understand this, you'll be able to utilize this knowledge to your advantage. Next, you will discover that similar OS also offers up services, protocols and even some built-in account that make them extremely attractive to attack. Finally, you will explore how default configurations and setting can haunt an organization when it comes to attackers gaining access to resources that are in some cases mission critical. When you are finished with this course, you will have the skills and knowledge of penetration tester needed to exploit hosts on any engagement.
Taught by
Dale Meredith
Related Courses
FinTech for Finance and Business LeadersACCA via edX Access Controls
(ISC)² via Coursera Advanced Cyber Security Training
EC-Council via FutureLearn Python для кибербезопасности. Финальный проект
E-Learning Development Fund via Coursera Advanced System Security Design
University of Colorado System via Coursera