Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

LinkedIn Learning

Ethical Hacking: System Hacking

via LinkedIn Learning

Overview

Learn to detect, prevent, and counter system hacking, including password cracking, privilege escalation, spyware, and keylogging, and study for the Certified Ethical Hacker exam.

Syllabus

Introduction
  • Welcome
  • What you should know
  • Hacking ethically
1. Understanding System Hacking
  • Setting the stage
  • Hacking goals
  • Authenticate a user
  • Challenge: Reviewing Azure authentication methods
  • Challenge: Reviewing Azure authentication methods
2. Gaining Access
  • Acquiring passwords
  • Password cracking techniques
  • Generating rainbow tables
  • Defend against password attacks
3. Escalating Priveleges
  • Privilege escalation overview
  • Obtaining administrator privileges
  • Executing applications
  • Defending against privilege escalation
4. Recognizing Spyware
  • Spyware overview
  • Spyware types
  • Capturing screen activity
  • Spyware on a cell phone
  • Defend against spyware
5. Grasping Keyloggers
  • Compare keystroke loggers
  • Using a keystroke logger
  • Methodology of keystroke logging
  • Keystroke loggers for macOS
  • Protect against keylogging
6. Hiding in Plain Sight
  • Swimming in the NTFS data stream
  • Using steganography
  • Understanding steganography
  • Using whitespace steganography
  • Hide a message with steganography
  • Detecting steganography
7. Covering Your Tracks
  • Disable logging and hide files
  • Outlining ways to cover your tracks
Conclusion
  • Next steps

Taught by

Lisa Bock

Reviews

4.6 rating at LinkedIn Learning based on 573 ratings

Start your review of Ethical Hacking: System Hacking

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.