Curriculum
- 10 Sections
- 10 Lessons
- 60 Hours
Expand all sectionsCollapse all sections
- Attack Methodology Introduction1
- Windows Endpoint Introduction1
- Windows Server Side Attacks1
- Windows Client-Side Attacks1
- Windows Privilege Escalation1
- Windows Persistence1
- Linux Endpoint Introduction1
- Linux Server Side Attacks1
- Network Detections1
- Antivirus Alerts and Evasion1
Learn the techniques attackers use to stay hidden on compromised Windows systems. Explore file system persistence, registry modification, scheduled tasks, and other methods to maintain a foothold.
Prev
Examine how adversaries compromise Linux servers, utilizing privilege escalation methods, service exploits, and configuration weaknesses.
Next

