Windows Exploits and Forensics: Intelligence Gathering

IT Security    |    Beginner
  • 13 videos | 1h 27m 13s
  • Includes Assessment
  • Earns a Badge
Rating 4.4 of 22 users Rating 4.4 of 22 users (22)
As a security operations person, you'll need to employ various Windows exploitation techniques to attack vulnerable target software and services. This course covers the various intelligence gathering techniques used for conducting offensive security operations against a Windows-based network to identify possible vulnerabilities. You'll start by examining open source intelligence (OSINT) gathering techniques and sources before conducting your own OSINT investigation. Next, you'll explore the use of social media and other tools for finding targets for social engineering exercises. You'll then examine common Windows services and their ports and tools for conducting basic enumeration. Moving along, you'll practice network scanning for open ports, scanning a Windows-based system, and enumerating data. Lastly, you'll explore various tools used in the Kali hacking environment, the use of Metasploitable, and common locations to find Windows exploits.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Identify open source intelligence gathering techniques and sources
    Conduct an osint investigation on a public document
    Identify what to look for using social media and other tools when finding targets for social engineering exercises
    Outline how to scan a network for open ports
    Conduct an nmap scan of a windows-based network
    Identify common windows services and their ports
  • Outline how to scan a system and name tools used to conduct basic enumeration
    Conduct a scan of a windows-based system and enumerate data
    Identify basic tools used within the kali hacking environment
    Use basic commands and recognize common issues within metasploitable
    Recognize common locations to find windows exploits
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 11s
  • 9m 28s
    In this video, you will learn how to identify open source intelligence gathering techniques and sources. FREE ACCESS
  • Locked
    3.  Conducting an OSINT Investigation
    8m 6s
    How to conduct an OSINT investigation on a public document. FREE ACCESS
  • Locked
    4.  Social Engineering Target Identification
    10m 2s
    Learn how to identify potential targets for social engineering exercises using social media and other tools. FREE ACCESS
  • Locked
    5.  Network Scanning for Open Ports
    9m 14s
    In this video, you will learn how to scan a network for open ports. FREE ACCESS
  • Locked
    6.  Conducting an Nmap Scan
    7m 56s
    In this video, you will learn how to conduct an Nmap scan of a Windows-based network. FREE ACCESS
  • Locked
    7.  Common Windows Services and Their Ports
    6m 5s
    In this video, you will learn how to identify common Windows services and their ports. FREE ACCESS
  • Locked
    8.  System Scanning and Enumeration Tools
    7m 58s
    In this video, you will outline how to scan a system and name tools used to conduct basic enumeration. FREE ACCESS
  • Locked
    9.  Conducting a Windows System Scan
    8m 1s
    In this video, learn how to scan a Windows-based system and enumerate data. FREE ACCESS
  • Locked
    10.  Standard Kali Tools
    5m 19s
    Find out how to identify basic tools used within the Kali hacking environment. FREE ACCESS
  • Locked
    11.  Using Metasploitable: Common Commands and Issues
    5m 59s
    Find out how to use basic commands and recognize common issues within Metasploitable. FREE ACCESS
  • Locked
    12.  Windows Exploit Discovery
    6m 40s
    Upon completion of this video, you will be able to recognize common locations for finding Windows exploits. FREE ACCESS
  • Locked
    13.  Course Summary
    1m 13s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 5.0 of 2 users Rating 5.0 of 2 users (2)
Rating 4.5 of 12 users Rating 4.5 of 12 users (12)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.8 of 14 users Rating 4.8 of 14 users (14)
Rating 4.9 of 13 users Rating 4.9 of 13 users (13)
Rating 4.4 of 200 users Rating 4.4 of 200 users (200)