Windows Exploits and Forensics: Intelligence Gathering
IT Security
| Beginner
- 13 videos | 1h 27m 13s
- Includes Assessment
- Earns a Badge
As a security operations person, you'll need to employ various Windows exploitation techniques to attack vulnerable target software and services. This course covers the various intelligence gathering techniques used for conducting offensive security operations against a Windows-based network to identify possible vulnerabilities. You'll start by examining open source intelligence (OSINT) gathering techniques and sources before conducting your own OSINT investigation. Next, you'll explore the use of social media and other tools for finding targets for social engineering exercises. You'll then examine common Windows services and their ports and tools for conducting basic enumeration. Moving along, you'll practice network scanning for open ports, scanning a Windows-based system, and enumerating data. Lastly, you'll explore various tools used in the Kali hacking environment, the use of Metasploitable, and common locations to find Windows exploits.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseIdentify open source intelligence gathering techniques and sourcesConduct an osint investigation on a public documentIdentify what to look for using social media and other tools when finding targets for social engineering exercisesOutline how to scan a network for open portsConduct an nmap scan of a windows-based networkIdentify common windows services and their ports
-
Outline how to scan a system and name tools used to conduct basic enumerationConduct a scan of a windows-based system and enumerate dataIdentify basic tools used within the kali hacking environmentUse basic commands and recognize common issues within metasploitableRecognize common locations to find windows exploitsSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 11s
-
9m 28sIn this video, you will learn how to identify open source intelligence gathering techniques and sources. FREE ACCESS
-
8m 6sHow to conduct an OSINT investigation on a public document. FREE ACCESS
-
10m 2sLearn how to identify potential targets for social engineering exercises using social media and other tools. FREE ACCESS
-
9m 14sIn this video, you will learn how to scan a network for open ports. FREE ACCESS
-
7m 56sIn this video, you will learn how to conduct an Nmap scan of a Windows-based network. FREE ACCESS
-
6m 5sIn this video, you will learn how to identify common Windows services and their ports. FREE ACCESS
-
7m 58sIn this video, you will outline how to scan a system and name tools used to conduct basic enumeration. FREE ACCESS
-
8m 1sIn this video, learn how to scan a Windows-based system and enumerate data. FREE ACCESS
-
5m 19sFind out how to identify basic tools used within the Kali hacking environment. FREE ACCESS
-
5m 59sFind out how to use basic commands and recognize common issues within Metasploitable. FREE ACCESS
-
6m 40sUpon completion of this video, you will be able to recognize common locations for finding Windows exploits. FREE ACCESS
-
1m 13s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.