Penetration Testing - Post Exploitation

Aspen Olmsted, NYUx

 Add to favorites

Learn post-exploitation phases of penetration testing, including Owning, Pivoting, Privilege Escalation and other advanced penetration testing topics.

This is a self-paced course that continues the development of ethical hacking skills. The curriculum provides an introduction to post-exploitation penetration testing topics. Among the topics covered are Owning, Pivoting, Privilege Escalation and other advanced penetration testing topics, The purpose of the Post-Exploitation phase is to determine the value of the machine compromised and to maintain control of the device for later use. The machine's value is determined by the sensitivity of the data stored on it and the machine's usefulness in further compromising the network. The methods the students learn in this phase are meant to help them identify and document sensitive information, identify configuration settings, communication channels, and relationships with other network devices that can be used to gain further access to the network. The students also learn how to set up one or more methods of accessing the machine later.

What will you learn

  1. Discover credentials utilizing hash dumps
  2. Perform pass-the-hash attacks
  3. Document results of the penetration test
  4. Utilize currently exploited systems to gain access to others.
  5. Configure exploitation tools to pivot through a target environment

Dates:
  • 2 February 2021
Course properties:
  • Free:
  • Paid:
  • Certificate:
  • MOOC:
  • Video:
  • Audio:
  • Email-course:
  • Language: English Gb

Reviews

No reviews yet. Want to be the first?

Register to leave a review

Show?id=n3eliycplgk&bids=695438
NVIDIA
More on this topic:
281138_ccf8_5 Practical Wi-fi Hacking/Penetration Testing Using Kali Linux by Zaid Al-Quraishi (and 1 other)
Learn how to test the security of Wi-fi networks from scratch using Kali linux...
More from 'Computer Science':
9395b535-1fa7-4ed4-9fd8-98b86ba682d9-98e1ff5caeec.small UX Research
In this MOOC you will learn how to connect with users at every step of a digital...
61be438f-28b9-4339-9437-21c34b3c3dd6-e9ecfcecaf58.small UX Prototyping
Become a prototyping virtuoso! Master the ability to propel your creative team...
Df0769a9-8b89-44ae-b223-4e9de3905b38-b5f92c09ad8d.small UX Data Analysis
Become a UX data scientist! From qualitative data analysis to big data Web analytics...
0b33df59-ff43-4433-8c99-b3defeca1ad8-1c29cdafeead.small UX Management
Be a UX advocate! Lead the gamut of user-centered design activities, while sharing...
Developers-logo Google's Python Class
Welcome to Google's Python Class -- this is a free class for people with a little...
More from 'edX':
9395b535-1fa7-4ed4-9fd8-98b86ba682d9-98e1ff5caeec.small UX Research
In this MOOC you will learn how to connect with users at every step of a digital...
61be438f-28b9-4339-9437-21c34b3c3dd6-e9ecfcecaf58.small UX Prototyping
Become a prototyping virtuoso! Master the ability to propel your creative team...
B42ba0d8-08b2-48a4-904e-851a800f0c0e-9d260507a74e.small Digital platforms in performance: radio drama, podcasts, video games, YouTube, and other online platforms
Advance your digital story-telling prowess and learn how to create interactive...
3dbb7e34-528e-4bf9-a64a-f021c4161fdd-c667d1f604b0.small Supply Chains for Manufacturing: Inventory Analytics Course
Learn about effective supply chain strategies for companies that operate globally...
E435bd5b-8843-40c8-b260-ce34433d9a0e-a3897f869072.small Global Business Strategy
Learn how to capitalize on opportunities, and manage the challenges of the global...

© 2013-2019