25.8.20
This website uses cookies to ensure you get the best experience on our website. Learn more

Windows Exploits and Forensics: Post Exploitation

Skillsoft issued completion badges are earned based on viewing the percentage required or receiving a passing score when assessment is required. As a penetration tester, it's vital that you are familiar with advanced methods of conducting offensive security operations against Windows environments. In this course, you’ll learn to recognize common post exploitation activities within a Windows environment and how to configure an advanced persistent threat. You’ll start by learning how to escalate privileges, use a DLL injection attack, pivot between systems, and crack user credentials. You'll then examine how to use PowerView to enumerate information and use BloodHound to 'walk the dog' and gain domain admin privileges. Finally, you'll learn how to clean up post attack to cover your tracks, create an advanced persistent threat, and use a ransomware attack to lock a system.

Issued on

February 21, 2022

Expires on

Does not expire