- Level Professional
- المدة 4 ساعات hours
- الطبع بواسطة Infosec
-
Offered by
عن
This course is a continuation of Python for Cybersecurity. The topics covered are execution, persistence, privilege escalation and evasion.الوحدات
Python for execution
1
Assignment
- Python for Execution
5
Videos
- MITRE ATT&CK: Execution
- Introduction to User Execution
- Malicious Links
- Introduction to Scheduled Tasks and Jobs
- Scheduled Execution
Python for persistence
1
Assignment
- Python for persistence
5
Videos
- MITRE ATT&CK: Persistence
- Introduction to Boot or Logon Autostart Execution
- Registry autorun
- Introduction to Hijack Execution Flow
- Hijacked execution flow
Python for privilege escalation
1
Assignment
- Python for privilege escalation
5
Videos
- MITRE ATT&CK: Privilege Escalation
- Introduction to Boot or Logon Autostart Execution
- Logon scripts
- Introduction to Process Injection
- Python library injection
Python for defense evasion
1
Assignment
- Python for defense evasion
5
Videos
- MITRE ATT&CK: Defense evasion
- Introduction to Impair Defenses
- Impair AVs
- Introduction to Hide Artifacts
- Alternate data streams
Auto Summary
Dive deep into advanced cybersecurity techniques with the "Execution, Persistence, Privilege Escalation, and Evasion" course, meticulously crafted for IT and Computer Science professionals. Building on the foundational knowledge from "Python for Cybersecurity," this course delves into critical concepts such as execution, persistence, privilege escalation, and evasion strategies, essential for enhancing your cybersecurity skills. Hosted by Coursera and designed for a professional level, this intensive 240-hour program offers an in-depth exploration of sophisticated security mechanisms and tactics. Learners can choose between Starter and Professional subscription options to best fit their career goals and learning preferences. Ideal for cybersecurity professionals and IT specialists seeking to advance their expertise in protecting systems from sophisticated threats, this course equips you with the knowledge and skills to effectively manage and counteract various cyber threats. Join now to stay ahead in the ever-evolving field of cybersecurity.

Howard Poston