25.9.2
This website uses cookies to ensure you get the best experience on our website. Learn more

CEH v11: \nBuffer Overflows, Privilege Escalation & System Access

Jagillapuram Vijay

Skillsoft issued completion badges are earned based on viewing the percentage required or receiving a passing score when assessment is required. Buffer overflows can be one of the more mysterious and difficult techniques to understand and employ, but when successful they can be highly useful when gaining access to target systems. In this course, you'll explore the basic concepts behind buffer overflows, as well as some useful protections against them and how to develop and deploy them in a test environment. Next, you'll examine common privilege escalation techniques, for both Windows and Linux operating systems, that can help you obtain full administrative access. Once you've fully compromised a host, you're going to want to hang on to that access for a long as possible. Finally, you'll learn about tools and techniques that will help you maintain access over a compromised target system. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.

Issued on

March 23, 2023

Expires on

Does not expire