Post-Exploitation Hacking (Cybrary)

Post-Exploitation Hacking (Cybrary)
Free Course
Categories
Effort
Certification
Languages
Security Administrators, Network Administrators
Misc

MOOC List is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Post-Exploitation Hacking (Cybrary)
As the name implies, Post Exploitation Hacking – Persistence and Continued Access, refers to the series of steps to be followed after breaking into a system. Offensive hacking to accomplish an objective requires ultimate stealth—but unfortunately many hackers (both script-kiddies and experienced professionals) sometimes fail to perform acts that conceal their identity and exploit their target covertly and consistently for intelligence and to accomplish the mission. In this free self-paced online training course, you’ll cover three main topics: Information Gathering, Backdooring and Covering Steps.

MOOC List is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

You’ll learn about how to use system specific tools to get general information about a system and its users, how to access the compromised system at any time, and how to hide your activity from system administrators. Additionally, you’ll master how to use listener shells, Metasploit and Meterpreter scripting.





MOOC List is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Free Course
Security Administrators, Network Administrators

MOOC List is learner-supported. When you buy through links on our site, we may earn an affiliate commission.