YoVDO

Post Exploitation Operations with Cobalt Strike

Offered By: Pluralsight

Tags

Cybersecurity Courses Network Security Courses Ethical Hacking Courses Penetration Testing Courses Privilege Escalation Courses Lateral Movement Courses Post Exploitation Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Cobalt Strike is a powerful and versatile penetration testing tool used by cybersecurity professionals to simulate real-world cyberattacks and assess an organization's security posture. You will learn post exploitation operations using Cobalt Strike.

In this course, Post Exploitation Operations with Cobalt Strike, you’ll learn to perform post exploitation techniques using Cobalt Strike. First, you’ll explore different beacon functionalities. Next, you’ll discover how to perform credential harvesting and privilege escalation. Finally, you’ll learn how to perform lateral movement. When you’re finished with this course, you’ll have the skills and knowledge of Cobalt Strike needed to perform post exploitation operations using Cobalt Strike.

Syllabus

  • Course Overview 1min
  • Cobalt Strike's Beacon: A Showcase of Advanced Capabilities 33mins
  • From Zero to Admin: Mastering Credential Theft and Privilege Escalation with Cobalt Strike 21mins
  • Navigating the Network Maze: Mastering Lateral Movement in Cobalt Strike 24mins

Taught by

Rishalin Pillay

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network