Windows Exploits and Forensics: Intelligence Gathering

IT Security    |    Beginner
  • 13 videos | 1h 27m 13s
  • Includes Assessment
  • Earns a Badge
Likes 15 Likes 15
As a security operations person, you'll need to employ various Windows exploitation techniques to attack vulnerable target software and services. This course covers the various intelligence gathering techniques used for conducting offensive security operations against a Windows-based network to identify possible vulnerabilities. You'll start by examining open source intelligence (OSINT) gathering techniques and sources before conducting your own OSINT investigation. Next, you'll explore the use of social media and other tools for finding targets for social engineering exercises. You'll then examine common Windows services and their ports and tools for conducting basic enumeration. Moving along, you'll practice network scanning for open ports, scanning a Windows-based system, and enumerating data. Lastly, you'll explore various tools used in the Kali hacking environment, the use of Metasploitable, and common locations to find Windows exploits.

WHAT YOU WILL LEARN

  • discover the key concepts covered in this course
    identify open source intelligence gathering techniques and sources
    conduct an OSINT investigation on a public document
    identify what to look for using social media and other tools when finding targets for social engineering exercises
    outline how to scan a network for open ports
    conduct an Nmap scan of a Windows-based network
    identify common Windows services and their ports
  • outline how to scan a system and name tools used to conduct basic enumeration
    conduct a scan of a Windows-based system and enumerate data
    identify basic tools used within the Kali hacking environment
    use basic commands and recognize common issues within Metasploitable
    recognize common locations to find Windows exploits
    summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 11s
  • 9m 28s
  • Locked
    3.  Conducting an OSINT Investigation
    8m 6s
  • Locked
    4.  Social Engineering Target Identification
    10m 2s
  • Locked
    5.  Network Scanning for Open Ports
    9m 14s
  • Locked
    6.  Conducting an Nmap Scan
    7m 56s
  • Locked
    7.  Common Windows Services and Their Ports
    6m 5s
  • Locked
    8.  System Scanning and Enumeration Tools
    7m 58s
  • Locked
    9.  Conducting a Windows System Scan
    8m 1s
  • Locked
    10.  Standard Kali Tools
    5m 19s
  • Locked
    11.  Using Metasploitable: Common Commands and Issues
    5m 59s
  • Locked
    12.  Windows Exploit Discovery
    6m 40s
  • Locked
    13.  Course Summary
    1m 13s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Likes 3 Likes 3  
Likes 27 Likes 27  

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Likes 18 Likes 18  
Likes 37 Likes 37