CompTIA PenTest+: Post-Exploitation Techniques

placeholder

Cybercriminals use post-exploitation techniques to maintain a level of access while they attempt to perform other actions during an open session. In this course you;ll learn about post-exploitation techniques and tools. You;ll explore common post-exploitation tools such as Empire Mimikatz and BloodHound. Next you;ll examine post-exploitation techniques such as lateral movement privilege escalation and upgrading a restrictive shell. You;ll learn techniques used to maintain foothold and persistence using trojans backdoors and daemons. Finally you;ll learn detection avoidance techniques as well as enumeration techniques used to extract users groups forests sensitive data and unencrypted files. This course is one of a collection that helps prepare learners for the CompTIA PenTest+ (PT0-002) certification exam.