Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

LinkedIn Learning

Ethical Hacking: System Hacking

via LinkedIn Learning

Overview

Learn to detect, prevent, and counter system hacking, including password cracking, privilege escalation, spyware, and keylogging, and study for the Certified Ethical Hacker exam.

System hacking is the way hackers get access to individual computers on a network. Ethical hackers learn system hacking to detect, prevent, and counter these types of attacks. This course explains the main methods of system hacking—password cracking, privilege escalation, spyware installation, and keylogging—and the countermeasures IT security professionals can take to fight these attacks. Security expert Lisa Bock also covers steganography, spyware on a cell phone, and tactics for hiding files and tools.

These tutorials, along with the other courses featured in the Ethical Hacking series, will prepare students to pass the Certified Ethical Hacker exam and start a career in this in-demand field. Find out more about the exam at https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/.

Syllabus

Introduction
  • Welcome
  • What you should know
  • Hacking ethically
1. System Hacking Overview
  • Setting the stage
  • Hacking goals
  • Authenticate a user
2. Gaining Access
  • Acquire passwords
  • Password cracking techniques
  • Generate rainbow tables
  • Defend against password attacks
3. Privilege Escalation
  • Privilege escalation overview
  • Escalating privileges
  • Executing applications
  • Defend against privilege escalation
4. Spyware
  • Spyware overview
  • Spyware types
  • Capture screen activity
  • Spyware on a cell phone
  • Defend against spyware
5. Keyloggers
  • Compare keystroke loggers
  • Keylogging with Actual Spy
  • Methodology of keystroke logging
  • Keystroke loggers for macOS
  • Protect against keylogging
6. Hiding in Plain Sight
  • Swimming in the NTFS data stream
  • Using steganography
  • Understanding steganography
  • Using whitespace steganography
  • Hide a message with steganography
  • Detect steganography
7. Cover Your Tracks
  • Disable logging and hide files
  • How to cover your tracks
Conclusion
  • Next steps

Taught by

Lisa Bock

Related Courses

Reviews

Start your review of Ethical Hacking: System Hacking

Never Stop Learning!

Get personalized course recommendations, track subjects and courses with reminders, and more.

Sign up for free