Curriculum
- 9 Sections
- 9 Lessons
- 80 Hours
Expand all sectionsCollapse all sections
- Operating System and Programming Theory1
- Client-Side Code Execution with Office1
- Client-Side Code Execution with Jscript1
- Process Injection and Migration1
- Introduction to Antivirus Evasion1
- Advanced Antivirus Evasion1
- Bypassing Network Filters1
- Linux Post-Exploitation1
- Windows Post-Exploitation1
This module covers a wide range of techniques for maintaining access and escalating privileges on compromised Linux systems. You’ll learn how to navigate file systems, manipulate user accounts, extract sensitive information, and establish persistent backdoors for future access.
Prev

