• Online, Self-Paced
Course Description

Explore multiple methods to hijack, or use insecure configurations, to gain unauthorized privileges.

Learning Objectives

Certified Ethical Hacker - CEHv10: Privilege Escalation

  • use DLL hijacking and file/folder permission exploitation to gain higher privileges
  • use scheduled tasks and insecure sudo implementations to gain higher privileges
  • use operating system vulnerabilities, webshells, and other techniques to gain unauthorized privileges

Framework Connections

Feedback

If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.