CompTIA PenTest+: Local Host Vulnerabilities

Intermediate
  • 8 videos | 38m 18s
  • Includes Assessment
  • Earns a Badge
Rating 4.3 of 13 users Rating 4.3 of 13 users (13)
Discover how to conduct penetration testing against specific local host operating systems, with an emphasis on Windows and Linux systems. This course can be used as part of the preparation for the PT0-001: CompTIA PenTest+ certification exam. You will learn how to recognize OS vulnerabilities, describe service and protocol configurations, and classify additional host-based exploits. As you delve into the topics, you will consider host-based and sandbox exploits and default account setting vulnerabilities. As a review exercise, you will list the five steps of a Linux privilege escalation exploit, name four protocol misconfiguration attack vectors, and name four features of securely encrypted enclaves.

WHAT YOU WILL LEARN

  • Recognize host os vulnerabilities
    Describe service and protocol configurations
    Define linux privilege escalation
    Specify windows privilege escalation
  • Classify additional host-based exploits
    Recognize account setting vulnerabilities
    Describe escape exploits
    Describe local host exploits

IN THIS COURSE

  • 10m 8s
    After completing this video, you will be able to recognize vulnerabilities in the host operating system. FREE ACCESS
  • 5m 9s
    After completing this video, you will be able to describe service and protocol configurations. FREE ACCESS
  • Locked
    3.  Linux-Specific Privilege Escalation
    4m 17s
    In this video, find out how to define Linux privilege escalation. FREE ACCESS
  • Locked
    4.  Windows-Specific Privilege Escalation
    3m 48s
    After completing this video, you will be able to specify Windows privilege escalation. FREE ACCESS
  • Locked
    5.  Additional Host-Based exploits
    4m 55s
    In this video, learn how to classify additional host-based exploits. FREE ACCESS
  • Locked
    6.  Default Account Setting Vulnerabilities
    3m 9s
    After completing this video, you will be able to recognize account settings vulnerabilities. FREE ACCESS
  • Locked
    7.  Sandbox Escape Exploits
    4m 23s
    Upon completion of this video, you will be able to describe escape routes. FREE ACCESS
  • Locked
    8.  Exercise: Describing Local Host Exploits
    2m 29s
    Upon completion of this video, you will be able to describe local host exploits. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 7 users Rating 4.6 of 7 users (7)
Rating 4.7 of 14 users Rating 4.7 of 14 users (14)
Rating 4.6 of 80 users Rating 4.6 of 80 users (80)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 110 users Rating 4.5 of 110 users (110)
Rating 4.8 of 24 users Rating 4.8 of 24 users (24)
Rating 4.3 of 15 users Rating 4.3 of 15 users (15)