Windows Exploits and Forensics: Intelligence Gathering
IT Security | Beginner
- 13 videos | 1h 27m 13s
- Includes Assessment
- Earns a Badge
As a security operations person, you'll need to employ various Windows exploitation techniques to attack vulnerable target software and services. This course covers the various intelligence gathering techniques used for conducting offensive security operations against a Windows-based network to identify possible vulnerabilities. You'll start by examining open source intelligence (OSINT) gathering techniques and sources before conducting your own OSINT investigation. Next, you'll explore the use of social media and other tools for finding targets for social engineering exercises. You'll then examine common Windows services and their ports and tools for conducting basic enumeration. Moving along, you'll practice network scanning for open ports, scanning a Windows-based system, and enumerating data. Lastly, you'll explore various tools used in the Kali hacking environment, the use of Metasploitable, and common locations to find Windows exploits.
WHAT YOU WILL LEARN
discover the key concepts covered in this courseidentify open source intelligence gathering techniques and sourcesconduct an OSINT investigation on a public documentidentify what to look for using social media and other tools when finding targets for social engineering exercisesoutline how to scan a network for open portsconduct an Nmap scan of a Windows-based networkidentify common Windows services and their ports
outline how to scan a system and name tools used to conduct basic enumerationconduct a scan of a Windows-based system and enumerate dataidentify basic tools used within the Kali hacking environmentuse basic commands and recognize common issues within Metasploitablerecognize common locations to find Windows exploitssummarize the key concepts covered in this course
IN THIS COURSE
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.Digital badges are yours to keep, forever.
YOU MIGHT ALSO LIKE
Course Trends in Cybersecurity
PEOPLE WHO VIEWED THIS ALSO VIEWED THESE
Course Windows Environments