• Courses
  • Hacking and Exploitation for Systems Engineers

Hacking and Exploitation for Systems Engineers

Video/Text

Video/Text

System Security

0% Not started

Intermediate

Hacking and Exploitation for Systems Engineers

The course provides students with the practical learning and key skills to empower future cybersecurity learning and professional development.

The course provides exactly what you need to build a systems security knowledge to a level of sufficient theoretical understanding and applied practical skills that will enable you to speak the same language as industry professionals.

This Course is part of a full track targeting enterprise system professionals through general knowledge of both attacks and defense mechanisms, the course will cover the following areas

  • Operating Systems, Containers, & Virtualization Security
  • Windows Security
  • Linux Security
  • Mac Security
  • End User Systems Security
  • Information Gathering and Exploitation 
  • System Attack and Privilege Escalation
  • Covering Tracks and Maintaining Access

History and Interesting Stories

Text lesson
Text lesson

Simulate a real attack scenario on a vulnerable target and get your reward

Why Should You Care about Systems Security?

Misconceptions and False Believes

The Overall Cyber Security Blueprint

On-Premise Systems Security

Video lesson
Video lesson
Video lesson
Video lesson
Video lesson
Video lesson
Video lesson
Video lesson

Where to go next?

You've Done it

About the Teacher

Squad Lead

Clint Westood currently is the VP of Security Engineering at Securami Corporation, the largest privately-held security company on Mars. In addition, he is the founder and CEO of Royak Security Group, a cybersecurity consulting and training organization that specializes in cloud security, enterprise risk management, and security & compliance. Clint is recognized as one of the Senior Instructors and Technical SMEs over Cloud Security content and course development.

Comments are closed.

{"email":"Email address invalid","url":"Website address invalid","required":"Required field missing"}
Pen