Post Exploitation Operations with Cobalt Strike
Offered By: Pluralsight
Course Description
Overview
Cobalt Strike is a powerful and versatile penetration testing tool used by cybersecurity professionals to simulate real-world cyberattacks and assess an organization's security posture. You will learn post exploitation operations using Cobalt Strike.
In this course, Post Exploitation Operations with Cobalt Strike, you’ll learn to perform post exploitation techniques using Cobalt Strike. First, you’ll explore different beacon functionalities. Next, you’ll discover how to perform credential harvesting and privilege escalation. Finally, you’ll learn how to perform lateral movement. When you’re finished with this course, you’ll have the skills and knowledge of Cobalt Strike needed to perform post exploitation operations using Cobalt Strike.
In this course, Post Exploitation Operations with Cobalt Strike, you’ll learn to perform post exploitation techniques using Cobalt Strike. First, you’ll explore different beacon functionalities. Next, you’ll discover how to perform credential harvesting and privilege escalation. Finally, you’ll learn how to perform lateral movement. When you’re finished with this course, you’ll have the skills and knowledge of Cobalt Strike needed to perform post exploitation operations using Cobalt Strike.
Syllabus
- Course Overview 1min
- Cobalt Strike's Beacon: A Showcase of Advanced Capabilities 33mins
- From Zero to Admin: Mastering Credential Theft and Privilege Escalation with Cobalt Strike 21mins
- Navigating the Network Maze: Mastering Lateral Movement in Cobalt Strike 24mins
Taught by
Rishalin Pillay
Related Courses
Network SecurityGeorgia Institute of Technology via Udacity Proactive Computer Security
University of Colorado System via Coursera Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
(ISC)² via Coursera Hacker101
HackerOne via Independent CNIT 127: Exploit Development
CNIT - City College of San Francisco via Independent