Ethical Hacker: Privilege Escalation

Ethical Hacker 10    |    Intermediate
  • 3 Videos | 1h 18m 52s
  • Includes Assessment
  • Earns a Badge
Likes 51 Likes 51
Explore multiple methods to hijack or use insecure configurations to gain unauthorized privileges, as you prepare for the 312-50: Certified Ethical Hacker v10 exam. Watch these videos and learn how to describe the different types of privilege escalation, create a malicious executable with Kali Linux to elevate privileges, and describe how to work with schedule tasks. You will also observe how to use command parameters to elevate privileges, locate an exploit in Kali Linux, compile source code into an executable program, and use Metasploit to exploit a Windows system.

WHAT YOU WILL LEARN

  • create a malicious executable with Kali Linux to elevate privileges
    describe the different types of privilege escalation
    describe how to work with schedule tasks
    use command parameters to elevate privileges
  • compile source code into an executable program
    locate an exploit in Kali Linux
    use Metasploit to exploit a Windows system

IN THIS COURSE

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Likes 76 Likes 76  
Likes 26 Likes 26  
Likes 37 Likes 37  

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Likes 55 Likes 55  
Likes 287 Likes 287