Description
In this course, you will learn:
- System hacking to detect, prevent, and counter these types of attacks.
 - The main methods of system hacking—password cracking, privilege escalation, spyware installation, and keylogging—and the countermeasures IT security professionals can take to fight these attacks.
 
Syllabus:
- Introduction
 - What you should know
 - Hacking ethically
 
1. Understanding System Hacking
- Setting the stage
 - Hacking goals
 - Authenticate a user
 - Challenge: Reviewing Azure authentication methods
 - Challenge: Reviewing Azure authentication methods
 
2. Gaining Access
- Acquiring passwords
 - Password cracking techniques
 - Generating rainbow tables
 - Defend against password attacks
 
3. Escalating Priveleges
- Privilege escalation overview
 - Obtaining administrator privileges
 - Executing applications
 - Defending against privilege escalation
 
4. Recognizing Spyware
- Spyware overview
 - Spyware types
 - Capturing screen activity
 - Spyware on a cell phone
 - Defend against spyware
 
5. Grasping Keyloggers
- Compare keystroke loggers
 - Using a keystroke logger
 - Methodology of keystroke logging
 - Keystroke loggers for macOS
 - Protect against keylogging
 
6. Hiding in Plain Sight
- Swimming in the NTFS data stream
 - Using steganography
 - Understanding steganography
 - Using whitespace steganography
 - Hide a message with steganography
 - Detecting steganography
 
7. Covering Your Tracks
- Disable logging and hide files
 - Outlining ways to cover your tracks
 









