Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Protect your Windows OS and prevent hackers from stealing or destroying your data. This course will teach you the weaknesses of the Windows OS, the different ways it can be hacked, and how to secure yourself against these attacks.
If you want to protect your Windows OS from getting hacked, you need to have an understanding of how hacking occurs and the tools to prevent it. In this course, Windows: How It's Hacked, How to Protect It, one of the world's foremost experts in the Windows OS will show you the principles behind different attacks against the modern Windows OS, from Windows XP to Windows 10, including computers with encrypted and non-encrypted disks. First, you will learn the how weaknesses of the Windows OS can be used to break into the system. You'll then go through a full path of hacks, starting with getting access to local computer, breaking into a company network, and elevating yourself to Domain Admin. Finally, you'll discover how to use built-in Windows privileges to bypass all ACL checks, steal another user's identity, and replace any protected file in a system. By the end of this course, you'll be able to secure your Windows OS and protect it from malicious attacks.
If you want to protect your Windows OS from getting hacked, you need to have an understanding of how hacking occurs and the tools to prevent it. In this course, Windows: How It's Hacked, How to Protect It, one of the world's foremost experts in the Windows OS will show you the principles behind different attacks against the modern Windows OS, from Windows XP to Windows 10, including computers with encrypted and non-encrypted disks. First, you will learn the how weaknesses of the Windows OS can be used to break into the system. You'll then go through a full path of hacks, starting with getting access to local computer, breaking into a company network, and elevating yourself to Domain Admin. Finally, you'll discover how to use built-in Windows privileges to bypass all ACL checks, steal another user's identity, and replace any protected file in a system. By the end of this course, you'll be able to secure your Windows OS and protect it from malicious attacks.