Penetration Testing - Post Exploitation (edX)
Categories
Effort
Languages
Learn post-exploitation phases of penetration testing, including Owning, Pivoting, Privilege Escalation and other advanced penetration testing topics. The machine's value is determined by the sensitivity of the data stored on it and the machine's usefulness in further compromising the network.
Not Available