Windows Exploits and Forensics: Intelligence Gathering

placeholder

As a security operations person youll need to employ various Windows exploitation techniques to attack vulnerable target software and services. This course covers the various intelligence gathering techniques used for conducting offensive security operations against a Windows-based network to identify possible vulnerabilities. Youll start by examining open source intelligence (OSINT) gathering techniques and sources before conducting your own OSINT investigation. Next youll explore the use of social media and other tools for finding targets for social engineering exercises. Youll then examine common Windows services and their ports and tools for conducting basic enumeration. Moving along youll practice network scanning for open ports scanning a Windows-based system and enumerating data. Lastly youll explore various tools used in the Kali hacking environment the use of Metasploitable and common locations to find Windows exploits.