CompTIA PenTest+: Post-Exploitation Techniques
CompTIA PenTest+
| Intermediate
- 12 Videos | 1h 5m 53s
- Includes Assessment
- Earns a Badge
Cybercriminals use post-exploitation techniques to maintain a level of access while they attempt to perform other actions during an open session. In this course, you'll learn about post-exploitation techniques and tools. You'll explore common post-exploitation tools such as Empire, Mimikatz, and BloodHound. Next, you'll examine post-exploitation techniques such as lateral movement, privilege escalation, and upgrading a restrictive shell. You'll learn techniques used to maintain foothold and persistence using trojans, backdoors, and daemons. Finally, you'll learn detection avoidance techniques, as well as enumeration techniques used to extract users, groups, forests, sensitive data, and unencrypted files. This course is one of a collection that helps prepare learners for the CompTIA PenTest+ (PT0-002) certification exam.
WHAT YOU WILL LEARN
-
discover the key concepts covered in this coursedemonstrate how to use the Empire post-exploitation tooldemonstrate how to use the Mimikatz post-exploitation tooldemonstrate how to use the BloodHound post exploitation tooldefine lateral movement in post-exploitation exercisesrecognize how to perform network segmentation testing
-
provide an overview of privilege escalation and differentiate between horizontal and vertical escalationrecognize how and why to perform a restrictive shell upgraderecognize techniques used to maintain foothold and persistenceidentify ways to cover tracks and avoid detectiondifferentiate between enumeration techniques used to gather user, group, and forest informationsummarize the key concepts covered in this course
IN THIS COURSE
-
1.Course Overview1m 29sUP NEXT
-
2.Performing Post-exploitation Using Empire8m 24s
-
3.Using Mimikatz for Post-exploitation5m 28s
-
4.Using the BloodHound Post-exploitation Tool4m 43s
-
5.Lateral Movement Techniques7m 14s
-
6.Network Segmentation Testing8m 44s
-
7.Privilege Escalation7m 15s
-
8.Restrictive Shell Upgrades4m 7s
-
9.Footholds and Persistence5m 4s
-
10.Detection Avoidance5m 55s
-
11.Enumeration Techniques6m 48s
-
12.Course Summary44s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform
Digital badges are yours to keep, forever.