MyPage is a personalized page based on your interests.The page is customized to help you to find content that matters you the most.


I'm not curious

Post Exploitation: Performing Infrastructure Analysis

Course Summary

Everything that comes after the shell during a penetration test is called post exploitation. This course introduces post exploitation and performing infrastructure analysis through service and configuration enumeration in a compromised network.


  • +

    Course Syllabus

    Course Overview
    - 1m 16s

    —Course Overview 1m 16s
    Understanding Post Exploitation
    - 5m 42s

    —Introduction 3m 56s
    —Demo - Setting up Your Virtual Lab 1m 46s
    Revisiting the Rules of Engagement
    - 9m 30s
    Analyzing Network Configuration with Inbuilt Tools
    - 11m 10s
    Analyzing Network Configuration with Uploaded Tools
    - 8m 56s
    Identifying Network Services
    - 21m 49s
    This End Is Where It Begins
    - 2m 42s


Course Fee:
USD 29

Course Type:

Self-Study

Course Status:

Active

Workload:

1 - 4 hours / week

Attended this course?

Back to Top

 
Awards & Accolades for MyTechLogy
Winner of
REDHERRING
Top 100 Asia
Finalist at SiTF Awards 2014 under the category Best Social & Community Product
Finalist at HR Vendor of the Year 2015 Awards under the category Best Learning Management System
Finalist at HR Vendor of the Year 2015 Awards under the category Best Talent Management Software
Hidden Image Url

Back to Top