Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:00,001 --> 00:00:02,007
- [Voiceover] Do you ever
wonder how easy it might be
2
00:00:02,007 --> 00:00:06,002
to obtain a password and
get into your system?
3
00:00:06,002 --> 00:00:10,003
Once in the system, what
can malicious parties do?
4
00:00:10,003 --> 00:00:12,006
Could they escalate their privileges
5
00:00:12,006 --> 00:00:14,002
to the administrator level?
6
00:00:14,002 --> 00:00:17,009
Hi, my name is Lisa Bock, and
I'm a security ambassador.
7
00:00:17,009 --> 00:00:20,004
In this course, I'll
explore the third phase
8
00:00:20,004 --> 00:00:22,009
of ethical hacking, system hacking,
9
00:00:22,009 --> 00:00:26,003
an important phase for many reasons.
10
00:00:26,003 --> 00:00:28,008
After scanning target systems,
11
00:00:28,008 --> 00:00:31,007
the ethical hacker is then
armed with more information,
12
00:00:31,007 --> 00:00:34,007
and has a better idea
of how malicious parties
13
00:00:34,007 --> 00:00:37,000
might get deeper into a system.
14
00:00:37,000 --> 00:00:40,003
In this course, I'll go over
methods to obtain a password,
15
00:00:40,003 --> 00:00:44,002
then once obtained, ways
to escalate your privileges
16
00:00:44,002 --> 00:00:47,002
and execute applications.
17
00:00:47,002 --> 00:00:50,005
I'll cover spyware,
capturing screen activity,
18
00:00:50,005 --> 00:00:53,002
and keystroke loggers.
19
00:00:53,002 --> 00:00:55,008
I'll review ways of hiding in plain sight
20
00:00:55,008 --> 00:00:59,008
using alternate data
streams and steganography.
21
00:00:59,008 --> 00:01:03,001
Finally, I'll discuss
ways to cover your tracks.
22
00:01:03,001 --> 00:01:06,005
This course is part of the
Ethical Hacking series.
23
00:01:06,005 --> 00:01:07,007
Are you ready?
24
00:01:07,007 --> 00:01:09,002
Let's get started.
1906
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.