5910 Breckenridge Pkwy Suite B, Tampa, FL. 33610
(800) 272-0707

SkillSoft Explore Course

IT Skills     Security     Security Accreditations and Best Practice     Certified Ethical Hacker (CEH) v10
Explore multiple methods to hijack or use insecure configurations to gain unauthorized privileges, as you prepare for the 312-50: Certified Ethical Hacker v10 exam. Watch these videos and learn how to describe the different types of privilege escalation, create a malicious executable with Kali Linux to elevate privileges, and describe how to work with schedule tasks. You will also observe how to use command parameters to elevate privileges, locate an exploit in Kali Linux, compile source code into an executable program, and use Metasploit to exploit a Windows system.

Objectives

Certified Ethical Hacker - CEHv10: Privilege Escalation

  • create a malicious executable with Kali Linux to elevate privileges
  • describe the different types of privilege escalation
  • describe how to work with schedule tasks
  • use command parameters to elevate privileges
  • compile source code into an executable program
  • locate an exploit in Kali Linux
  • use Metasploit to exploit a Windows system