About This Course
This course focuses on highlighting the initial techniques that a computer scientist can perform once they have accessed a vulnerable system. Alongside with the theory that will be covered, students will have the opportunity to get an inside look at the system, and how certain things work within the system. We will also see topics such as, important Commands during the Access period of an attack, tools that help us to enumerate the system from the inside, manual privilege escalation techniques and more.
This will all center around the most used enterprise OS environments, Linux and Windows, in order to provide the student with applied knowledge of both systems.
Requirements
1- An Interest in learning.
2- Basic knowledge of Linux and Windows systems
3- Basic knowledge of Virtualizers (Vmware and virtualbox)
Frequently Asked Questions
What will we learn in the course?
Mainly getting to know to a system, and what to do once we are inside the system, how to perform privilege escalation in Windows and Linux systems, commands that will be useful when searching for information within the system, etc.
How many hours does this course last?
Around 5 hours of interactive, theoretic and practical content.