MyPage is a personalized page based on your interests.The page is customized to help you to find content that matters you the most.


I'm not curious

Ethical Hacking: System Hacking

Course Summary

You've done your homework; now it's time to totally and completely "pwn" your target and yet make no one the wiser that you've made it in. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking


  • +

    Course Syllabus

    Understanding This Stage
    - 10m 43s

    —Understanding This Stage 2m 11s
    —Now, How Exactly Did We Get Here? 2m 26s
    —What Are Our Goals? 1m 45s
    —The Three Goals and Five Phases 3m 19s
    —Summary 1m 0s
    Phase 1: Gaining Access – Cracking Passwords
    - 48m 26s

    —Phase 1: Gaining Access 3m 12s
    —What's Cracking? 7m 13s
    —Complexity 8m 14s
    —The Architecture 8m 26s
    —Techniques Used 6m 29s
    —Types of Attacks 6m 6s
    —The Hash 5m 44s
    —Summary 2m 58s
    More Cracking
    - 39m 17s
    Phase 2: Gaining Access – Escalating Privileges
    - 24m 0s
    Phase 3: Maintaining Access – Executing Applications
    - 32m 39s
    Phase 4: Maintaining Access – Hiding Your Tools
    - 24m 35s
    Phase 5: Covering Your Tracks - Clearing Logs and Evidence
    - 19m 1s


Course Fee:
USD 29

Course Type:

Self-Study

Course Status:

Active

Workload:

1 - 4 hours / week

Related Posts:

Attended this course?

Back to Top

Awards & Accolades for MyTechLogy
Winner of
REDHERRING
Top 100 Asia
Finalist at SiTF Awards 2014 under the category Best Social & Community Product
Finalist at HR Vendor of the Year 2015 Awards under the category Best Learning Management System
Finalist at HR Vendor of the Year 2015 Awards under the category Best Talent Management Software
Hidden Image Url

Back to Top