Ethical Hacker: Privilege Escalation
Ethical Hacker 10 | Intermediate
- 3 videos | 1h 15m 22s
- Includes Assessment
- Earns a Badge
Explore multiple methods to hijack or use insecure configurations to gain unauthorized privileges, as you prepare for the 312-50: Certified Ethical Hacker v10 exam. Watch these videos and learn how to describe the different types of privilege escalation, create a malicious executable with Kali Linux to elevate privileges, and describe how to work with schedule tasks. You will also observe how to use command parameters to elevate privileges, locate an exploit in Kali Linux, compile source code into an executable program, and use Metasploit to exploit a Windows system.
WHAT YOU WILL LEARN
create a malicious executable with Kali Linux to elevate privilegesdescribe the different types of privilege escalationuse command parameters to elevate privilegesdescribe how to work with schedule tasks
use Metasploit to exploit a Windows systemcompile source code into an executable programlocate an exploit in Kali Linux
IN THIS COURSE
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.Digital badges are yours to keep, forever.
YOU MIGHT ALSO LIKE
PEOPLE WHO VIEWED THIS ALSO VIEWED THESE