Hacker Methodologies for Security Professionals
Hacker Methodologies for Security Professionals
Description
Hacker Methodologies for Security Professionals teaches you the processes threat actors use to break into organizations’ networks and steal their most sensitive data. Utilizing industry-standard penetration testing and auditing software, you will learn to identify, scan, and enumerate target systems; correlate services to vulnerabilities and exploits; employ exploits to gain access to the target systems; elevate privileges; propagate through the network; and cover their tracks within a target network. This course is focused primarily on Linux and Windows operating systems, so students should be comfortable with both.