Description
In this course, you will learn:
- System hacking to detect, prevent, and counter these types of attacks.
- The main methods of system hacking—password cracking, privilege escalation, spyware installation, and keylogging—and the countermeasures IT security professionals can take to fight these attacks.
Syllabus:
- Introduction
- What you should know
- Hacking ethically
1. Understanding System Hacking
- Setting the stage
- Hacking goals
- Authenticate a user
- Challenge: Reviewing Azure authentication methods
- Challenge: Reviewing Azure authentication methods
2. Gaining Access
- Acquiring passwords
- Password cracking techniques
- Generating rainbow tables
- Defend against password attacks
3. Escalating Priveleges
- Privilege escalation overview
- Obtaining administrator privileges
- Executing applications
- Defending against privilege escalation
4. Recognizing Spyware
- Spyware overview
- Spyware types
- Capturing screen activity
- Spyware on a cell phone
- Defend against spyware
5. Grasping Keyloggers
- Compare keystroke loggers
- Using a keystroke logger
- Methodology of keystroke logging
- Keystroke loggers for macOS
- Protect against keylogging
6. Hiding in Plain Sight
- Swimming in the NTFS data stream
- Using steganography
- Understanding steganography
- Using whitespace steganography
- Hide a message with steganography
- Detecting steganography
7. Covering Your Tracks
- Disable logging and hide files
- Outlining ways to cover your tracks