Overview
This course covers file transfers, pivoting, and reporting writing in the cybersecurity field. The learning outcomes include understanding how to transfer files securely, maintain access to systems, pivot between networks, and document findings. The course teaches skills such as conducting penetration tests, writing reports, and providing career advice. The teaching method includes video lectures and practical demonstrations. The intended audience for this course is individuals interested in cybersecurity, ethical hacking, and penetration testing.
Syllabus
- Welcome.
- Housekeeping.
- File transfers.
- Maintaining Access.
- Pivoting.
- Cleanup.
- Legal/Documentation.
- Career advice.
Taught by
The Cyber Mentor