Ethical Hacker: Privilege Escalation
Ethical Hacker 10 | Intermediate
- 3 Videos | 1h 18m 52s
- Includes Assessment
- Earns a Badge
Explore multiple methods to hijack or use insecure configurations to gain unauthorized privileges, as you prepare for the 312-50: Certified Ethical Hacker v10 exam. Watch these videos and learn how to describe the different types of privilege escalation, create a malicious executable with Kali Linux to elevate privileges, and describe how to work with schedule tasks. You will also observe how to use command parameters to elevate privileges, locate an exploit in Kali Linux, compile source code into an executable program, and use Metasploit to exploit a Windows system.
WHAT YOU WILL LEARN
create a malicious executable with Kali Linux to elevate privilegesdescribe the different types of privilege escalationdescribe how to work with schedule tasksuse command parameters to elevate privileges
compile source code into an executable programlocate an exploit in Kali Linuxuse Metasploit to exploit a Windows system
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platformDigital badges are yours to keep, forever.
YOU MIGHT ALSO LIKE
PEOPLE WHO VIEWED THIS ALSO VIEWED THESE