CompTIA PenTest+: Post-Exploitation Techniques

CompTIA    |    Intermediate
  • 12 videos | 1h 5m 53s
  • Includes Assessment
  • Earns a Badge
Rating 4.2 of 13 users Rating 4.2 of 13 users (13)
Cybercriminals use post-exploitation techniques to maintain a level of access while they attempt to perform other actions during an open session. In this course, you'll learn about post-exploitation techniques and tools. You'll explore common post-exploitation tools such as Empire, Mimikatz, and BloodHound. Next, you'll examine post-exploitation techniques such as lateral movement, privilege escalation, and upgrading a restrictive shell. You'll learn techniques used to maintain foothold and persistence using trojans, backdoors, and daemons. Finally, you'll learn detection avoidance techniques, as well as enumeration techniques used to extract users, groups, forests, sensitive data, and unencrypted files. This course is one of a collection that helps prepare learners for the CompTIA PenTest+ (PT0-002) certification exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Demonstrate how to use the empire post-exploitation tool
    Demonstrate how to use the mimikatz post-exploitation tool
    Demonstrate how to use the bloodhound post exploitation tool
    Define lateral movement in post-exploitation exercises
    Recognize how to perform network segmentation testing
  • Provide an overview of privilege escalation and differentiate between horizontal and vertical escalation
    Recognize how and why to perform a restrictive shell upgrade
    Recognize techniques used to maintain foothold and persistence
    Identify ways to cover tracks and avoid detection
    Differentiate between enumeration techniques used to gather user, group, and forest information
    Summarize the key concepts covered in this course

IN THIS COURSE

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 4.6 of 44 users Rating 4.6 of 44 users (44)
Rating 4.8 of 30 users Rating 4.8 of 30 users (30)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.8 of 17 users Rating 4.8 of 17 users (17)
Rating 4.7 of 19 users Rating 4.7 of 19 users (19)
Rating 4.8 of 27 users Rating 4.8 of 27 users (27)