Companies Home Search Profile

Ethical Hacking: System Hacking

Focused View

Lisa Bock

2:13:14

0 View
  • 01 - Hacking the system.mp4
    00:51
  • 02 - Getting the most out of this course.mp4
    01:03
  • 03 - Hacking ethically.mp4
    00:55
  • 01 - Setting the stage.mp4
    04:01
  • 02 - Getting a foothold.mp4
    02:53
  • 03 - Authenticating a user.mp4
    03:54
  • 04 - Challenge Reviewing Entra ID authentication methods.mp4
    00:57
  • 05 - Solution Reviewing Entra ID authentication methods.mp4
    02:38
  • 01 - Acquiring passwords.mp4
    04:16
  • 02 - Discovering password tools.mp4
    03:35
  • 03 - Cracking passwords.mp4
    04:20
  • 04 - Employing rainbow tables.mp4
    04:54
  • 05 - Defending against password attacks.mp4
    03:41
  • 01 - Leveraging security flaws.mp4
    05:41
  • 02 - Overflowing the buffer.mp4
    02:48
  • 03 - Enhancing software security.mp4
    03:23
  • 01 - Understanding privilege escalation.mp4
    03:58
  • 02 - Obtaining administrator privileges.mp4
    04:41
  • 03 - Defending against privilege escalation.mp4
    04:50
  • 01 - Dissecting rootkits.mp4
    02:58
  • 02 - User Mode and Kernel Mode.mp4
    04:24
  • 03 - Using rootkits.mp4
    04:45
  • 04 - Detect, remove, and avoid rootkits.mp4
    03:49
  • 01 - Outlining keystroke loggers.mp4
    03:44
  • 02 - Protecting against keylogging.mp4
    02:56
  • 01 - Explaining spyware behavior.mp4
    03:38
  • 02 - Mobile spyware and invasive apps.mp4
    03:29
  • 03 - Defending against spyware.mp4
    03:31
  • 01 - Using steganography.mp4
    04:50
  • 02 - Swimming in the NTFS data stream.mp4
    04:17
  • 03 - Using whitespace steganography.mp4
    01:44
  • 04 - Detecting steganography.mp4
    05:59
  • 01 - Remaining in the system.mp4
    02:51
  • 02 - Staying under the radar.mp4
    03:36
  • 03 - Defend against persistence attacks.mp4
    03:15
  • 01 - Disabling logging and hiding files.mp4
    04:24
  • 02 - Outlining ways to cover your tracks.mp4
    04:33
  • 03 - Summarize the course and whats next.mp4
    01:12
  • Description


    Ethical hacking involves testing to see if an organization's network is vulnerable to outside attacks. It's one of the most desired skills in an IT security professional. In this course, security ambassador Lisa Bock guides you through the System Hacking competency from the CEH Body of Knowledge. Find out how hackers are able to hack into a system and gain access. Learn about privilege escalation, keyloggers, and spyware. Plus, explore countermeasures that IT security professionals can take to prevent these attacks.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    Experienced author with a demonstrated history of working in the e-learning industry. She is a security ambassador with a broad range of IT skills and knowledge, including networking, CyberOps, Wireshark, biometrics, Ethical Hacking and the IoT. Lisa is an author for LinkedIn Learning, Packt Publishing and CompTIA and is an award-winning speaker who has presented at several national conferences. She holds a MS in computer information systems/information assurance from UMGC. Lisa was an associate professor in the IT department at Pennsylvania College of Technology (Williamsport, PA) from 2003 until her retirement in 2020. She is involved with various volunteer activities, and she and her husband Mike enjoy bike riding, watching movies, and traveling.
    LinkedIn Learning is an American online learning provider. It provides video courses taught by industry experts in software, creative, and business skills. It is a subsidiary of LinkedIn. All the courses on LinkedIn fall into four categories: Business, Creative, Technology and Certifications. It was founded in 1995 by Lynda Weinman as Lynda.com before being acquired by LinkedIn in 2015. Microsoft acquired LinkedIn in December 2016.
    • language english
    • Training sessions 38
    • duration 2:13:14
    • English subtitles has
    • Release Date 2024/12/06

    Courses related to Ethical Hacking