Companies Home Search Profile

Ethical Hacking: System Hacking

Focused View

Dale Meredith

4:22:17

7 View
  • 01. Course Overview.mp4
    02:05
  • 02. Clarifying the Phases and Methods for System Hacking.mp4
    05:43
  • 03. Learning Check.mp4
    01:44
  • 04. Basic Issues with Passwords.mp4
    05:09
  • 05. Complexity.mp4
    03:22
  • 06. Demo-Password Strength.mp4
    05:24
  • 07. Where Are All the Passwords.mp4
    03:43
  • 08. Demo-Finding the SAM and NTDS.dit.mp4
    02:55
  • 09. Types of Attacks.mp4
    01:45
  • 10. Active Online Attacks.mp4
    07:32
  • 11. Demo-L0phtCrack.mp4
    04:09
  • 12. The Hash and Attacks.mp4
    08:59
  • 13. Demo-Responder.mp4
    07:25
  • 14. Learning Checks.mp4
    02:27
  • 15. NTLM Authentication.mp4
    06:15
  • 16. Kerberos Authentication.mp4
    04:09
  • 17. Salting.mp4
    03:24
  • 18. Rainbow Tables and Other Options.mp4
    06:09
  • 19. Demo-Creating a Rainbow Table.mp4
    04:56
  • 20. Demo-Cain Abel.mp4
    09:27
  • 21. Password Recovery Tools.mp4
    03:03
  • 22. Demo-John the Ripper.mp4
    04:20
  • 23. Learning Check.mp4
    03:17
  • 24. Escalating Privileges.mp4
    01:38
  • 25. Now What.mp4
    05:55
  • 26. Types of Escalation.mp4
    01:32
  • 27. Demo-HiveNightmare Escalation.mp4
    10:12
  • 28. Horizontal Escalation.mp4
    01:24
  • 29. DLL Hijacking.mp4
    04:02
  • 30. Spectre and Meltdow.mp4
    03:35
  • 31. Other Issues.mp4
    09:45
  • 32. Learning Check.mp4
    05:00
  • 33. What Youre Trying to Achieve.mp4
    07:35
  • 34. Remote Code Execution.mp4
    05:34
  • 35. Keyloggers.mp4
    07:06
  • 36. Spyware.mp4
    06:18
  • 37. Types of Spyware.mp4
    11:35
  • 38. Backdoors.mp4
    06:07
  • 39. Learning Check.mp4
    03:45
  • 40. Rootkits.mp4
    12:04
  • 41. Detecting Rootkits.mp4
    03:25
  • 42. The Scary One-Alternate Data Streams.mp4
    01:57
  • 43. Demo-Alternate Data Streams.mp4
    09:57
  • 44. Steganography.mp4
    05:00
  • 45. Learning Check.mp4
    04:26
  • 46. Why You Cover Your Tracks.mp4
    04:05
  • 47. The Basic Method.mp4
    03:33
  • 48. Demo-Basic Methods.mp4
    05:46
  • 49. The Advanced Methods.mp4
    00:54
  • 50. Demo-Advance Methods.mp4
    04:17
  • 51. Demo-Covering BASH Histories.mp4
    02:39
  • 52. Learning Check.mp4
    03:41
  • 53. Domain Summary.mp4
    02:08
  • Description


    This course will teach you the techniques of hacking systems that you’ll need for the 312-50 exam

    What You'll Learn?


      System hacking is one of the most important, and sometimes, the ultimate goal of an attacker. In this course, Ethical Hacking: System Hacking, you’ll learn the different techniques attackers will use to breach your systems. First, you’ll explore the hacking methodology that attackers use. Next, you’ll discover gain access and escalate privileges. Finally, you’ll learn how to maintain access to the targets you’ve "pwned". When you’re finished with this course, you’ll have the skills and knowledge of an ethical hacker needed for the 312-50.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    Dale Meredith
    Dale Meredith
    Instructor's Courses
    Dale Meredith has been a Certified Ethical Hacker/Instructor EC-Council for the past 15 years, and Microsoft Certified Trainer for over 20 years. Dale also has an additional 7 years of senior IT management experience and worked as a CTO for a popular ISP provider. Dale's expertise is in explaining difficult concepts and ensuring his students have an actionable knowledge of the course material. Straddling the line of fun and function, Dale's instruction is memorable and entertaining. Dale's knowledge and understanding of current trends in technology and applications have led to many opportunities, such as: training various Inc 500 companies, universities, and Divisions of the Department of Homeland Security for the United States government. Along with authoring for Pluralsight, consulting, and IT classroom training, you can catch Dale on stage speaking at IT conferences, helping IT teams keep their companies safe, relevant, and "breach" aware. Outside of the professional sphere, Dale spends quite a bit of his time giving back by speaking at adult and youth non-profit community gatherings and posting on his 'Dale Dumbs IT Down' social media sites. Dale uses these speaking engagements and social media sites to 'Dumb Down IT' concepts with the intent to help everyone be safe and smart with their technology and personal devices. Dale also specializes in Active Directory, Exchange Server, IIS, PowerShell, SharePoint, System Center/Desktop Deployment, and Private Cloud
    Pluralsight, LLC is an American privately held online education company that offers a variety of video training courses for software developers, IT administrators, and creative professionals through its website. Founded in 2004 by Aaron Skonnard, Keith Brown, Fritz Onion, and Bill Williams, the company has its headquarters in Farmington, Utah. As of July 2018, it uses more than 1,400 subject-matter experts as authors, and offers more than 7,000 courses in its catalog. Since first moving its courses online in 2007, the company has expanded, developing a full enterprise platform, and adding skills assessment modules.
    • language english
    • Training sessions 53
    • duration 4:22:17
    • level average
    • Release Date 2023/12/15