Ethical Hacking: System Hacking
This course will teach you the techniques of hacking systems that you’ll need for the 312-50 exam
System hacking is one of the most important, and sometimes, the ultimate goal of an attacker. In this course, Ethical Hacking: System Hacking, you’ll learn the different techniques attackers will use to breach your systems. First, you’ll explore the hacking methodology that attackers use. Next, you’ll discover gain access and escalate privileges. Finally, you’ll learn how to maintain access to the targets you’ve “pwned”. When you’re finished with this course, you’ll have the skills and knowledge of an ethical hacker needed for the 312-50.
Author Name: Dale Meredith
Author Description:
Dale Meredith has been a Certified Ethical Hacker/Instructor EC-Council for the past 15 years, and Microsoft Certified Trainer for over 20 years. Dale also has an additional 7 years of senior IT management experience and worked as a CTO for a popular ISP provider. Dale’s expertise is in explaining difficult concepts and ensuring his students have an actionable knowledge of the course material. Straddling the line of fun and function, Dale’s instruction is memorable and entertaining. Dale’s knowl… more
Table of Contents
- Course Overview
2mins - Clarifying the Phases and Methods for System Hacking
7mins - Gaining Access: Cracking Passwords
52mins - Gaining Access: More Cracking Methods
45mins - Gaining Access: Escalating Privileges
43mins - Maintaining Access: Executing Applications
48mins - Maintaining Access: Hiding Your Tools
36mins - Techniques for Establishing Persistence
11mins - Clearing Logs: Covering Your Tracks
24mins - Domain Summary
2mins
There are no reviews yet.