Ethical Hacking: System Hacking

You've done your homework; now it's time to totally and completely "pwn" your target and yet make no one the wiser that you've made it in. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking
Course info
Rating
(121)
Level
Beginner
Updated
September 24, 2015
Duration
3h 18m
Table of contents
Description
Course info
Rating
(121)
Level
Beginner
Updated
September 24, 2015
Duration
3h 18m
Description

This is what it all comes down to. After we've done our research, we've found our target, and identified its services, shares, users and resources, it’s time to take total and complete control of this box. In turn, we then use this box to repeat our efforts to pwn more boxes within the network as well as grab any intellectual property that could be of great worth. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking

About the author
About the author

Dale Meredith received his Certified Ethical Hacker and Certified EC-Counsel Instructor certifications back in 2006, as well as being a Microsoft Certified Trainer since 1998 (yes we had computers back then). Dale takes great pride in helping students comprehend and simplify complex IT concepts.

More from the author
Secure Software Development
Beginner
3h 15m
12 Sep 2017
More courses by Dale Meredith