Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

LinkedIn Learning

Ethical Hacking: System Hacking

via LinkedIn Learning

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Learn to detect, prevent, and counter system hacking, including password cracking, privilege escalation, spyware, and keylogging, and study for the Certified Ethical Hacker exam.

Syllabus

Introduction
  • Welcome
  • What you should know
  • Hacking ethically
1. Understanding System Hacking
  • Setting the stage
  • Hacking goals
  • Authenticate a user
  • Challenge: Reviewing Azure authentication methods
  • Challenge: Reviewing Azure authentication methods
2. Gaining Access
  • Acquiring passwords
  • Password cracking techniques
  • Generating rainbow tables
  • Defend against password attacks
3. Escalating Priveleges
  • Privilege escalation overview
  • Obtaining administrator privileges
  • Executing applications
  • Defending against privilege escalation
4. Recognizing Spyware
  • Spyware overview
  • Spyware types
  • Capturing screen activity
  • Spyware on a cell phone
  • Defend against spyware
5. Grasping Keyloggers
  • Compare keystroke loggers
  • Using a keystroke logger
  • Methodology of keystroke logging
  • Keystroke loggers for macOS
  • Protect against keylogging
6. Hiding in Plain Sight
  • Swimming in the NTFS data stream
  • Using steganography
  • Understanding steganography
  • Using whitespace steganography
  • Hide a message with steganography
  • Detecting steganography
7. Covering Your Tracks
  • Disable logging and hide files
  • Outlining ways to cover your tracks
Conclusion
  • Next steps

Taught by

Lisa Bock

Reviews

4.6 rating at LinkedIn Learning based on 573 ratings

Start your review of Ethical Hacking: System Hacking

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.