YoVDO

Modern Post-Exploitation Strategies

Offered By: 44CON Information Security Conference via YouTube

Tags

44CON Courses Cybersecurity Courses

Course Description

Overview

Explore advanced post-exploitation techniques in this conference talk delivered by Rich Smith at 44CON 2012 in London. Delve into cutting-edge strategies used by security professionals after successfully breaching a system, gaining insights into maintaining access, lateral movement, and data exfiltration methods. Learn about the latest tools and tactics employed in modern post-exploitation scenarios, enhancing your understanding of both offensive and defensive security practices.

Syllabus

Modern Post-Exploitation Strategies. Rich Smith at 44CON 2012.


Taught by

44CON Information Security Conference

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network