Ethical Hacking: System Hacking

Go to class
Write Review

Free Online Course: Ethical Hacking: System Hacking provided by LinkedIn Learning is a comprehensive online course, which lasts for 1-2 hours worth of material. The course is taught in English and is free of charge. Upon completion of the course, you can receive an e-certificate from LinkedIn Learning. Ethical Hacking: System Hacking is taught by Lisa Bock.

Overview
  • Learn to detect, prevent, and counter system hacking, including password cracking, privilege escalation, spyware, and keylogging, and study for the Certified Ethical Hacker exam.

Syllabus
  • Introduction

    • Welcome
    • What you should know
    • Hacking ethically
    1. Understanding System Hacking
    • Setting the stage
    • Hacking goals
    • Authenticate a user
    • Challenge: Reviewing Azure authentication methods
    • Challenge: Reviewing Azure authentication methods
    2. Gaining Access
    • Acquiring passwords
    • Password cracking techniques
    • Generating rainbow tables
    • Defend against password attacks
    3. Escalating Priveleges
    • Privilege escalation overview
    • Obtaining administrator privileges
    • Executing applications
    • Defending against privilege escalation
    4. Recognizing Spyware
    • Spyware overview
    • Spyware types
    • Capturing screen activity
    • Spyware on a cell phone
    • Defend against spyware
    5. Grasping Keyloggers
    • Compare keystroke loggers
    • Using a keystroke logger
    • Methodology of keystroke logging
    • Keystroke loggers for macOS
    • Protect against keylogging
    6. Hiding in Plain Sight
    • Swimming in the NTFS data stream
    • Using steganography
    • Understanding steganography
    • Using whitespace steganography
    • Hide a message with steganography
    • Detecting steganography
    7. Covering Your Tracks
    • Disable logging and hide files
    • Outlining ways to cover your tracks
    Conclusion
    • Next steps