CompTIA PenTest+: Post-Exploitation Techniques
CompTIA
| Intermediate
- 12 videos | 1h 5m 53s
- Includes Assessment
- Earns a Badge
Cybercriminals use post-exploitation techniques to maintain a level of access while they attempt to perform other actions during an open session. In this course, you'll learn about post-exploitation techniques and tools. You'll explore common post-exploitation tools such as Empire, Mimikatz, and BloodHound. Next, you'll examine post-exploitation techniques such as lateral movement, privilege escalation, and upgrading a restrictive shell. You'll learn techniques used to maintain foothold and persistence using trojans, backdoors, and daemons. Finally, you'll learn detection avoidance techniques, as well as enumeration techniques used to extract users, groups, forests, sensitive data, and unencrypted files. This course is one of a collection that helps prepare learners for the CompTIA PenTest+ (PT0-002) certification exam.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseDemonstrate how to use the empire post-exploitation toolDemonstrate how to use the mimikatz post-exploitation toolDemonstrate how to use the bloodhound post exploitation toolDefine lateral movement in post-exploitation exercisesRecognize how to perform network segmentation testing
-
Provide an overview of privilege escalation and differentiate between horizontal and vertical escalationRecognize how and why to perform a restrictive shell upgradeRecognize techniques used to maintain foothold and persistenceIdentify ways to cover tracks and avoid detectionDifferentiate between enumeration techniques used to gather user, group, and forest informationSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 29s
-
8m 24s
-
5m 28s
-
4m 43s
-
7m 14s
-
8m 44s
-
7m 15s
-
4m 7s
-
5m 4s
-
5m 55s
-
6m 48s
-
44s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.