Penetration Testing - Post Exploitation (edX)

Penetration Testing - Post Exploitation (edX)
Course Auditing
Categories
Effort
Certification
Languages
Misc

MOOC List is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Penetration Testing - Post Exploitation (edX)
Learn post-exploitation phases of penetration testing, including Owning, Pivoting, Privilege Escalation and other advanced penetration testing topics. The machine's value is determined by the sensitivity of the data stored on it and the machine's usefulness in further compromising the network.

Class Deals by MOOC List - Click here and see edX's Active Discounts, Deals, and Promo Codes.

MOOC List is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

This is the 8th course in the intermediate, undergraduate-level offering that makes up the larger Cybersecurity Fundamentals MicroBachelors Program. We recommend taking them in order, unless you have a background in these areas already and feel comfortable skipping ahead.

- Information Security - Introduction to Information Security

- Information Security - Authentication and Access Control

- Information Security - Advanced Topics

- Network Security - Introduction to Network Security

- Network Security - Protocols

- Network Security - Advanced Topics

- Penetration Testing - Discovering Vulnerabilities

- Penetration Testing - Exploitation

- Penetration Testing - Post Exploitation

These topics build upon the learnings that are taught in the introductory-level Computer Science Fundamentals MicroBachelors program, offered by the same instructor.

This is a self-paced course that continues the development of ethical hacking skills. The curriculum provides an introduction to post-exploitation penetration testing topics. Among the topics covered are Owning, Pivoting, Privilege Escalation and other advanced penetration testing topics, The purpose of the Post-Exploitation phase is to determine the value of the machine compromised and to maintain control of the device for later use. The machine's value is determined by the sensitivity of the data stored on it and the machine's usefulness in further compromising the network. The methods the students learn in this phase are meant to help them identify and document sensitive information, identify configuration settings, communication channels, and relationships with other network devices that can be used to gain further access to the network. The students also learn how to set up one or more methods of accessing the machine later.

This course is part of the Cybersecurity Fundamentals MicroBachelors® Program.


What you'll learn

1. Discover credentials utilizing hash dumps

2. Perform pass-the-hash attacks

3. Document results of the penetration test

4. Utilize currently exploited systems to gain access to others.

5. Configure exploitation tools to pivot through a target environment

6. Collapse what you'll learn


Syllabus


Week 1 - Post Exploitation - Owning, Pivoting, Privilege Escalation

Week 2 - Review of Web App Exploits

Week 3 - Exploitation – Passwords and Authentication

Week 4 - Penetration Testing Advanced Topics

Week 5 - Final Exam



0
No votes yet

MOOC List is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Course Auditing
137.00 EUR

MOOC List is learner-supported. When you buy through links on our site, we may earn an affiliate commission.