CompTIA PenTest+: Local Host Vulnerabilities
Intermediate
- 8 Videos | 38m 18s
- Includes Assessment
- Earns a Badge
Discover how to conduct penetration testing against specific local host operating systems, with an emphasis on Windows and Linux systems. This course can be used as part of the preparation for the PT0-001: CompTIA PenTest+ certification exam. You will learn how to recognize OS vulnerabilities, describe service and protocol configurations, and classify additional host-based exploits. As you delve into the topics, you will consider host-based and sandbox exploits and default account setting vulnerabilities. As a review exercise, you will list the five steps of a Linux privilege escalation exploit, name four protocol misconfiguration attack vectors, and name four features of securely encrypted enclaves.
WHAT YOU WILL LEARN
-
recognize host OS vulnerabilitiesdescribe service and protocol configurationsdefine Linux privilege escalationspecify Windows privilege escalation
-
classify additional host-based exploitsrecognize account setting vulnerabilitiesdescribe escape exploitsdescribe local host exploits
IN THIS COURSE
-
1.Overview of OS Vulnerabilities10m 8sUP NEXT
-
2.Unsecure Service and Protocol Configuration5m 9s
-
3.Linux-Specific Privilege Escalation4m 17s
-
4.Windows-Specific Privilege Escalation3m 48s
-
5.Additional Host-Based exploits4m 55s
-
6.Default Account Setting Vulnerabilities3m 9s
-
7.Sandbox Escape Exploits4m 23s
-
8.Exercise: Describing Local Host Exploits2m 29s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform
Digital badges are yours to keep, forever.