Hacking

 

 


 

Customize your search:

E.g., 2016-12-10
E.g., 2016-12-10
E.g., 2016-12-10
Self Paced

As the name implies, Post Exploitation Hacking – Persistence and Continued Access, refers to the series of steps to be followed after breaking into a system. Offensive hacking to accomplish an objective requires ultimate stealth—but unfortunately many hackers (both script-kiddies and experienced professionals) sometimes fail to perform acts that conceal their identity and exploit their target covertly and consistently for intelligence and to accomplish the mission. In this free self-paced online training course, you’ll cover three main topics: Information Gathering, Backdooring and Covering Steps.

Average: 6.8 (4 votes)
Self Paced

Digital crime is more prevalent than ever, and the attacks are getting highly complex. Security software can’t pinpoint it—the eyes and expertise of a trained professional is necessary. Our free Computer and Hacking Forensics training teaches you how to become that professional.

Average: 7.7 (11 votes)
Self Paced

As the amount of cyber threats continue to grow, so does the Cyber Security industry. The need for capable ethical hackers is a global need. Ethical hackers are “white-hat” hackers (aka the good guys) that penetrate secured systems to highlight flaws and weaknesses in a system. They help government agencies, private businesses and public organizations identify what is secure and what needs to be fixed. If the idea of hacking as a career excites you, you’ll benefit greatly from completing Penetration Testing and Ethical Hacking training here on Cybrary.

Average: 6.2 (30 votes)