This Course is part of a Career Path: Become a Penetration Tester

Course Content

Section 1

09:26
1.1 Post Exploitation Hacking Introduction
08:21
1.2 Basics of Networking Mac & IP Addressing
04:58
1.3 Basics of Networking - Tcp; Udp; Icmp
10:37
1.4 Basics of Networking - Headers
04:35
1.5 Introduction Information Gathering

Section 2

09:42
2.1 Linux Host Information Gathering (part 1) Ifconfig
20:33
2.2 Linux Host Information Gathering (part 2) netstat
08:14
2.3 Linux Host Information Gathering (part 3) Nsswitch.conf.info
11:04
2.4 Linux Tools Lab (part 1) Ifconfig, Arp, Netstat
09:36
2.5 Linux Tools Lab (part 2) Resolv.conf, Nmap, Nsswitch
15:07
2.6 Linux Scanning Lab
15:50
2.7 Linux Network Information Gathering Lecture (part 1)
16:17
2.8 Linux Network Information Gathering Lecture (part 2)
15:14
2.9 Linux Sniffing
21:12
2.10 Windows Host Tools (part 1)
20:20
2.11 Windows Host Information Gathering Lecture
11:17
2.12 Windows Host Tools (part 2)
14:02
2.13 Windows Network Tools Lab
13:43
2.14 Windows Network Information Gathering Lecture (part 1)
14:32
2.15 Windows Network Information Gathering Lecture (part 2)
08:07
2.16 Windows Network Information Gathering Lecture (part 3)

Section 3

03:40
3.1 Introduction Part 3 Persistence & Backdooring
12:06
3.2 Tftp Use Lab
08:00
3.3 Enabling Rdp Windows Lab
16:56
3.4 Rdp Lecture
10:16
3.5 Ncat Backdoor Lecture
17:10
3.6 Windows Ncat Backdoor Lab
07:51
3.7 New User Backdoor Lecture
11:48
3.8 Windows New User Backdoor Lab
09:58
3.9 Batch Schtasks At (part 1)
13:22
3.10 Batch Schtasks At (part 2) Windows Scheduling
12:02
3.11 Linux Bash History - Touch - Lab

Section 4

12:10
4.1 Linux Bash History - Covering Tracks
15:49
4.2 Password Cracking Concepts
21:24
4.3 Windows Logs, Timestamps, & Passwords Lecture
08:13
4.4 Windows Clearing Event Logs
09:53
4.5 Windows Passwords
13:54
4.6 Conclusion

Course Description

People should educate themselves - you can get a[n] education for no money." - Ray Bradbury

Cyber Security training enables millions of otherwise capable individuals the opportunity to contribute to a field that they were previously barred from, because of their inability to pay to learn. That's why we are all here, because we all deserve the opportunity to learn.

Increase your offensive Cyber Security knowledge with online Post Exploitation Hacking training. This online self-paced training will point you in the right direction with a methodology proven to provide the best results when performing hacking activities on highly secured systems with the mission objectives in mind, a skill needed for offensive hackers to be successful in their field.

About the Online Post Exploitation Hacking Training


Post Exploitation - Persistence and Continued Access

As the name implies, Post Exploitation Hacking - Persistence and Continued Access, refers to the series of steps to be followed after breaking into a system. Offensive hacking to accomplish an objective requires ultimate stealth---but unfortunately many hackers (both script-kiddies and experienced professionals) sometimes fail to perform acts that conceal their identity and exploit their target covertly and consistently for intelligence and to accomplish the mission. In this free self-paced online training course, you'll cover three main topics: Information Gathering, Backdooring and Covering Steps. You'll learn about how to use system specific tools to get general information about a system and its users, how to access the compromised system at any time, and how to hide your activity from system administrators. Additionally, you'll master how to use listener shells, metasploit and meterpreter scripting.

Upon completion of this course, you'll be ready to accomplish your intel gathering mission, the right way.

CEU / CPE: 10

Total Clock Hours: 6 hrs, 38 mins

Get a Certificate of Completion

If you enjoy this course, be sure to check out the Advanced Pen Testing class or the Computer Forensics class, always free!

This course sponsored by: @anothertech

Do you know someone who could benefit from this training class? Email them an invite and they can join you, and you earn member points!

Instructed By

Instructor Profile Image
Joe Perry
Senior Technical Instructor at FireEye, Inc
Instructor

Provided By

Cybrary Logo

Certificate of Completion

Certificate Of Completion

Complete this entire course to earn a Post Exploitation Hacking Certificate of Completion

Comprehensive Learning

See the full benefits of our immersive learning experience with interactive courses and guided career paths.