Companies Home Search Profile

Ethical Hacking: Post-Exploitation

Focused View

Peter A

1:02:58

69 View
  • 1 - Introduction.html
  • 2 - Initial Access.mp4
    05:59
  • 3 - Bypass Firewall.mp4
    03:07
  • 4 - System info.mp4
    02:35
  • 5 - Users.mp4
    02:09
  • 6 - Network.mp4
    02:16
  • 7 - Meterpreter Shell.mp4
    05:10
  • 8 - Crack Passwords.mp4
    05:07
  • 9 - Initial Access.mp4
    05:46
  • 10 - Notes.html
  • 11 - Whats next.mp4
    02:43
  • 12 - System.mp4
    05:53
  • 13 - System notes.html
  • 14 - Crack Passwords.mp4
    05:54
  • 15 - Crack Passwords notes.html
  • 16 - Users.mp4
    05:53
  • 17 - User notes.html
  • 18 - Networking.mp4
    05:13
  • 19 - Networking notes.html
  • 20 - Services.mp4
    05:13
  • 21 - Services notes.html
  • Description


    Hack Windows and Linux

    What You'll Learn?


    • Crack Passwords
    • Hack Windows 7
    • Hack Linux
    • Get System Info

    Who is this for?


  • Beginner Ethical Hackers
  • More details


    Description

    Hacking is an intellectual and physical task that involves penetrating a system or network. Generally speaking, hacking is the act of accessing a computer system or network.  The practice of hacking is commonly done by black hat hackers, but white hat hackers also engage in the task. Hacking can be done to facilitate criminal acts such as theft, destruction and extortion. For example, a hacker may access a system without malicious intent and then inform the owner of the incident, who may be able to fix the problem. But it can also be used for securing a companies assets.

    In this course you will learn how both Windows and Linux can be hacked. It starts with initial access. Then it goes deeper into exploring the system, the meterpreter shell and how to crack passwords on both Windows and Linux systems. By the end of the course, you should be able to hack both systems as long as you gain initial access.

    This is a beginners course, you don't need prior knowledge of ethical hacking, both knowledge in networks and the command line can definitely help. In this course you'll use Kali Linux, a computer system that is designed for hacking.



    Who this course is for:

    • Beginner Ethical Hackers

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    Ethical Hacker with Software Development background. I first started programming long ago as a hobby and along the way learned many things. I've programmed in basic, c++, java and many other languages. I'm programming as a hobby. I've used a variety of operating systems and also database systems. I'm here to share my experience. Then I got into Ethical Hacking
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 14
    • duration 1:02:58
    • Release Date 2023/02/26