Privilege Escalation

Sort options

Execution, persistence, privilege escalation and evasion (Coursera)

This course is a continuation of Python for Cybersecurity. The topics covered are execution, persistence, privilege escalation and evasion
0
No votes yet

Penetration Testing - Post Exploitation (edX)

Learn post-exploitation phases of penetration testing, including Owning, Pivoting, Privilege Escalation and other advanced penetration testing topics. The machine's value is determined by the sensitivity of the data stored on it and the machine's usefulness in further compromising the network.
0
No votes yet