Certified Ethical Hacker (Part 2 of 8): Operating Systems and Hacking
Interactive

Certified Ethical Hacker (Part 2 of 8): Operating Systems and Hacking

Biz Library
Updated Jan 21, 2020

In this course Rafiq will dig deeper into the primary operating systems used for hacking: Linux and Windows. Automating tasks is critical to your job as a hacker, and knowledge of shell scripts is key. Some of these examples will be shown as well as an overview of hacking terminology around operating systems and a look at Linux and Windows.

Lesson 1:

  • Demo: The Linux Environment
  • Demo: ifconfig
  • Demo: Linux File Structure
  • Demo: Permissions.

Lesson 2:

  • Demo: File Permissions
  • Demo: Users
  • Demo: Permissions Cont.
  • Demo: User Permissions.

Lesson 3:

  • Demo: File Permissions
  • Demo: Sticky Bit.

Lesson 4:

  • Demo: Active Directory
  • Demo: Group Policy Management
  • Demo: Applying Policy
  • Demo: Read and Write Permissions.