Uptime logo
Uptime logo
CreatorsSign in

Get in touch

Contact usFAQ
InstagramFacebookTwitterLinkedIn
CreatorsSign in
en

Course Hack
Ethical Hacking: System HackingBy Lisa Bock

In a Nutshell

As part of her Ethical Hacking series, security ambassador Lisa Bock takes us through an intermediary course on the scanning phase of ethical hacking.

Favorite Quote

Do you ever wonder how easy it might be to obtain a password and get into your system? Once in the system, what can malicious parties do? Could they escalate their privileges to the administrator level?

Lisa Bock

Introduction

Hackers are often portrayed as master criminals, penetrating into computer networks for devious purposes.

But many hackers also work for good, testing computer systems and developing better security methods.

Security ambassador Lisa Bock developed the Ethical Hacking series to help IT professionals, network administrators, and cybersecurity enthusiasts to better protect the cyber assets under their charge.

Formerly a professor at the Pennsylvania College of Technology, Bock is a seasoned educator whose expertise ranges from networking to biometrics.

This installment of the series focuses on different ways of accessing individual computers on a network, including password cracking, privilege escalation, spyware installation, and keylogging.

The course demonstrates the countermeasures we can take to protect systems under our care, as well as preparing students for the Certified Ethical Hacker exam needed to pursue a career as an ethical hacker.

Here are the 3 key insights from this Hack

  1. 1.
    System hacking is often aimed at getting a password
  2. 2.
    Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nunc volutpat, leo ut.
  3. 3.
    Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nunc volutpat, leo ut.
To see the rest,Download the app

Thousands more Hacks on Uptime

Stand out from the crowd

Uptime helps you save time, reach your goals, and feel more confident across any area of your life.