Study any time, from any device.

Post-exploitation Activities

Take a look at post-exploitation activities with four videos on lateral movement, persistence and covering your tracks.

4 videos  //  30 minutes of training

Course description

So you’ve exploited the weaknesses in a system and gotten in. Now what? Four videos take you through post-exploitation activities in a pentest: lateral movement, persistence (the art of maintaining access to a victim machine after the initial exploit) and methods for covering your tracks, including erasing, modifying or disabling evidence. Includes demonstration video to take you through the process of ensuring persistence and covering tracks.

Course syllabus

Lateral MovementDuration: 9:10

PersistenceDuration: 6:49

Covering Your TracksDuration: 5:38

Persistence and Covering Tracks DemonstrationDuration: 7:53

Meet the author

Jason Dion

LinkedIn

Jason Dion specializes in actionable information you can use to further your Cyber Security and Information Technology career. He provides IT certification and training videos to help students prepare for a career in the Information Technology and Cyber Security field, providing you with the real world training and application to today's cyber security challenges.

Jason Dion, CISSP No. 349867, is an Instructor at Liberty University’s College of Engineering and Computational Science and Anne Arundel Community College’s Department of Computing Technologies with multiple information technology professional certifications, including Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), Certified Network Defense Architect (CNDA), Digital Forensic Examiner (DFE), Digital Media Collector (DMC), Security+, Network+, A+, PRINCE2, PRINCE2 Agile, and ITIL.

You're in good company

"Comparing Infosec to other vendors is like comparing apples to oranges. My instructor was hands-down the best I’ve had." 

James Coyle

FireEye, Inc.

"I knew Infosec could tell me what to expect on the exam and what topics to focus on most."

Julian Tang

Chief Information Officer

"I’ve taken five boot camps with Infosec and all my instructors have been great."

Jeffrey Coa

Information Security Systems Officer