CompTIA PenTest+: Post-Exploitation Techniques

CompTIA PenTest+    |    Intermediate
  • 12 Videos | 1h 5m 53s
  • Includes Assessment
  • Earns a Badge
Cybercriminals use post-exploitation techniques to maintain a level of access while they attempt to perform other actions during an open session. In this course, you'll learn about post-exploitation techniques and tools. You'll explore common post-exploitation tools such as Empire, Mimikatz, and BloodHound. Next, you'll examine post-exploitation techniques such as lateral movement, privilege escalation, and upgrading a restrictive shell. You'll learn techniques used to maintain foothold and persistence using trojans, backdoors, and daemons. Finally, you'll learn detection avoidance techniques, as well as enumeration techniques used to extract users, groups, forests, sensitive data, and unencrypted files. This course is one of a collection that helps prepare learners for the CompTIA PenTest+ (PT0-002) certification exam.

WHAT YOU WILL LEARN

  • discover the key concepts covered in this course
    demonstrate how to use the Empire post-exploitation tool
    demonstrate how to use the Mimikatz post-exploitation tool
    demonstrate how to use the BloodHound post exploitation tool
    define lateral movement in post-exploitation exercises
    recognize how to perform network segmentation testing
  • provide an overview of privilege escalation and differentiate between horizontal and vertical escalation
    recognize how and why to perform a restrictive shell upgrade
    recognize techniques used to maintain foothold and persistence
    identify ways to cover tracks and avoid detection
    differentiate between enumeration techniques used to gather user, group, and forest information
    summarize the key concepts covered in this course

IN THIS COURSE

  • Playable
    1. 
    Course Overview
    1m 29s
    UP NEXT
  • Playable
    2. 
    Performing Post-exploitation Using Empire
    8m 24s
  • Locked
    3. 
    Using Mimikatz for Post-exploitation
    5m 28s
  • Locked
    4. 
    Using the BloodHound Post-exploitation Tool
    4m 43s
  • Locked
    5. 
    Lateral Movement Techniques
    7m 14s
  • Locked
    6. 
    Network Segmentation Testing
    8m 44s
  • Locked
    7. 
    Privilege Escalation
    7m 15s
  • Locked
    8. 
    Restrictive Shell Upgrades
    4m 7s
  • Locked
    9. 
    Footholds and Persistence
    5m 4s
  • Locked
    10. 
    Detection Avoidance
    5m 55s
  • Locked
    11. 
    Enumeration Techniques
    6m 48s
  • Locked
    12. 
    Course Summary
    44s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Likes 0 Likes 0