We may earn an affiliate commission when you visit our partners.
Course image
Howard Poston

This course is a continuation of Python for Cybersecurity. The topics covered are execution, persistence, privilege escalation and evasion.

Enroll now

What's inside

Syllabus

Python for execution
A look at Python and Code execution.
Python for persistence
Explore the details of using Python for persistence
Read more
Python for privilege escalation
Exploring privilege escalation with Python
Python for defense evasion
Explore the details of using Python for defense evasion.

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Examines command execution using Python
Explores persistence techniques using Python
Demonstrates privilege escalation using Python
Illustrates defense evasion techniques using Python
Suitable for learners with prior experience in Python programming
Likely helpful for cybersecurity professionals

Save this course

Save Execution, persistence, privilege escalation and evasion to your list so you can find it easily later:
Save

Reviews summary

Engaging course on privilege escalation

According to students, this course is well received and provides engaging assignments with great insights into cybersecurity. The instructor is clear in their explanations, and the content is well paced. While the course focuses on Windows systems, it also addresses security concerns for Linux, which allows learners to explore different operating systems. Overall, students find this course to be a valuable learning experience.
Instructor provides clear explanations
"The instructor was very clear in his explaining of the various concepts that were being covered"
"Excellent overview of the uses of Python as a security tool. Not for Python beginners but instructor explains the how and why very well."
Includes MITRE framework and real-life examples
"The introduction to the MITRE framework is great and the selection of MITRE techniques to be studied in the exercices is great as well."
"Explanations about cybersecurity stuff are crystal clear."
"Courses always follow the same pattern : content flows from theory to an in-depth use-case ending logically with a Python example that is a very good illustration."
Some videos are incomplete or cut off
"Quality control issues (videos incomplete)."
"There are videos that are cut in the middle, code that no longer apply and do not work even if you try really hard."
Course primarily focuses on Windows systems
"This course concentrates in windows computer (Windows computers!!!!!!) where sometimes things does not for the simple fact that is windows."
"The attacks perform are with administrator accounts so obviously it will work."

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Execution, persistence, privilege escalation and evasion with these activities:
Review Object-Oriented Programming Concepts
Reviewing OOP concepts strengthens your foundation and enhances your ability to apply them effectively in Python code execution.
Browse courses on Python
Show steps
  • Go over OOP concepts such as classes, objects, inheritance, and polymorphism
  • Practice writing simple OOP programs in Python
Review Python Code Execution Using Tutorials
Reviewing tutorials deepens your understanding of Python code execution concepts and helps you apply them effectively.
Show steps
  • Find tutorials on Python code execution
  • Follow the tutorials step-by-step
  • Practice writing Python code to execute programs
Join Study Groups for Python Code Execution
Participating in study groups allows you to collaborate with peers, share knowledge, and gain diverse perspectives on Python code execution topics.
Show steps
  • Find or create study groups focused on Python code execution
  • Attend regular meetings to discuss concepts
  • Work on projects or assignments together
Four other activities
Expand to see all activities and additional details
Show all seven activities
Solve Python Code Execution Problems
Solving code execution problems enhances your ability to apply Python concepts, identify and resolve issues, and improve your programming skills.
Show steps
  • Find online platforms or resources with Python code execution problems
  • Attempt to solve the problems independently
  • Review solutions and discuss with peers or instructors
Attend Python Code Execution Workshops
Attending workshops provides a structured environment to enhance your skills, learn from experts, and expand your knowledge.
Show steps
  • Find and register for Python code execution workshops
  • Actively participate in the workshops
  • Network with other participants and instructors
Create a Python Code Execution Guide
Creating a comprehensive guide on Python code execution helps you synthesize your knowledge, improve your understanding, and share it with others.
Show steps
  • Plan the structure and content of the guide
  • Research and gather information on Python code execution
  • Write and organize the guide
  • Share the guide with peers or publish it online
Develop a Python Code Execution Toolkit
Creating a toolkit of commonly used code execution functions and scripts streamlines your workflow and improves your efficiency.
Show steps
  • Identify and gather essential code execution functions and scripts
  • Develop and test the functions and scripts
  • Organize and document the toolkit
  • Share the toolkit with peers or make it publicly available

Career center

Learners who complete Execution, persistence, privilege escalation and evasion will develop knowledge and skills that may be useful to these careers:
Penetration Tester
The Penetration Tester is responsible for testing the security of computer networks and systems. They use a variety of techniques to identify vulnerabilities and weaknesses in security systems. This includes using Python programming to write scripts and tools to test for vulnerabilities. The Python for Cybersecurity course may be useful for Penetration Testers as it provides a foundation in Python programming and covers topics such as execution, persistence, privilege escalation, and evasion, which are all important concepts for Penetration Testers to understand.
Ethical Hacker
The Ethical Hacker is responsible for testing the security of computer networks and systems to identify vulnerabilities and weaknesses. They work with organizations to develop and implement security measures to protect their data and systems from unauthorized access. The Python for Cybersecurity course may be useful for Ethical Hackers as it provides a foundation in Python programming, which is a valuable skill for this role. The course covers topics such as execution, persistence, privilege escalation, and evasion, which are all important concepts for Ethical Hackers to understand.
Malware Analyst
The Malware Analyst is responsible for analyzing malware to identify its purpose and behavior. They work to develop and implement strategies to detect and prevent malware infections. This includes using Python programming to write scripts and tools to analyze malware samples. The Python for Cybersecurity course may be useful for Malware Analysts as it provides a foundation in Python programming and covers topics such as execution, persistence, privilege escalation, and evasion, which are all important concepts for Malware Analysts to understand.
Security Researcher
The Security Researcher is responsible for conducting research into new security threats and vulnerabilities. They work to develop new security tools and techniques to protect organizations from cyber threats. This includes using Python programming to write scripts and tools to automate security research tasks. The Python for Cybersecurity course may be useful for Security Researchers as it provides a foundation in Python programming and covers topics such as execution, persistence, privilege escalation, and evasion, which are all important concepts for Security Researchers to understand.
Forensic Analyst
The Forensic Analyst is responsible for investigating computer crimes and cyberattacks. They work to collect and analyze evidence from computer systems and networks to identify the perpetrators of cybercrimes. This includes using Python programming to write scripts and tools to automate forensic analysis tasks. The Python for Cybersecurity course may be useful for Forensic Analysts as it provides a foundation in Python programming and covers topics such as execution, persistence, privilege escalation, and evasion, which are all important concepts for Forensic Analysts to understand.
Vulnerability Analyst
The Vulnerability Analyst is responsible for identifying and assessing vulnerabilities in software and systems. They work to develop and implement strategies to mitigate vulnerabilities and protect organizations from cyber threats. This includes using Python programming to write scripts and tools to automate vulnerability assessment tasks. The Python for Cybersecurity course may be useful for Vulnerability Analysts as it provides a foundation in Python programming and covers topics such as execution, persistence, privilege escalation, and evasion, which are all important concepts for Vulnerability Analysts to understand.
Incident Responder
The Incident Responder is responsible for responding to security incidents. They work to identify the source of the incident, contain the damage, and restore the organization's systems to normal operation. This includes using Python programming to write scripts and tools to automate incident response tasks. The Python for Cybersecurity course may be useful for Incident Responders as it provides a foundation in Python programming and covers topics such as execution, persistence, privilege escalation, and evasion, which are all important concepts for Incident Responders to understand.
Information Security Analyst
The Information Security Analyst designs and implements security measures to protect an organization's computer networks and systems. They work to identify and mitigate risks to the organization's data and systems. This includes implementing security policies and procedures, monitoring networks for suspicious activity, and responding to security incidents. The Python for Cybersecurity course may be useful for Information Security Analysts as it provides a foundation in Python programming, which is a valuable skill for this role. The course covers topics such as execution, persistence, privilege escalation, and evasion, which are all important concepts for Information Security Analysts to understand.
Cybersecurity Auditor
The Cybersecurity Auditor is responsible for auditing an organization's security systems and practices to ensure compliance with security regulations and standards. They work to identify and assess risks to the organization's data and systems and to make recommendations for improvements to the organization's security posture. The Python for Cybersecurity course may be useful for Cybersecurity Auditors as it provides a foundation in Python programming, which is a valuable skill for this role. The course covers topics such as execution, persistence, privilege escalation, and evasion, which are all important concepts for Cybersecurity Auditors to understand.
DevSecOps Engineer
The DevSecOps Engineer is responsible for integrating security into the software development lifecycle. They work to identify and assess risks to software applications and to develop and implement security solutions to mitigate those risks. The Python for Cybersecurity course may be useful for DevSecOps Engineers as it provides a foundation in Python programming, which is a valuable skill for this role. The course covers topics such as execution, persistence, privilege escalation, and evasion, which are all important concepts for DevSecOps Engineers to understand.
Security Engineer
The Security Engineer designs, implements, and maintains security systems for organizations. They work to protect the organization's data and systems from unauthorized access, use, disclosure, disruption, modification, or destruction. This includes implementing security policies and procedures, monitoring networks for suspicious activity, and responding to security incidents. The Python for Cybersecurity course may be useful for Security Engineers as it provides a foundation in Python programming, which is a valuable skill for this role. The course covers topics such as execution, persistence, privilege escalation, and evasion, which are all important concepts for Security Engineers to understand.
Cloud Security Engineer
The Cloud Security Engineer is responsible for securing cloud-based applications and infrastructure. They work to identify and assess risks to cloud-based systems and to develop and implement security solutions to mitigate those risks. The Python for Cybersecurity course may be useful for Cloud Security Engineers as it provides a foundation in Python programming, which is a valuable skill for this role. The course covers topics such as execution, persistence, privilege escalation, and evasion, which are all important concepts for Cloud Security Engineers to understand.
Security Architect
The Security Architect is responsible for designing and implementing the security architecture for an organization. They work to identify and assess risks to the organization's data and systems and to develop and implement security solutions to mitigate those risks. The Python for Cybersecurity course may be useful for Security Architects as it provides a foundation in Python programming, which is a valuable skill for this role. The course covers topics such as execution, persistence, privilege escalation, and evasion, which are all important concepts for Security Architects to understand.
Cybersecurity Consultant
The Cybersecurity Consultant provides advice and guidance to organizations on how to protect their computer networks and systems from cyber threats. They work with organizations to develop and implement security policies and procedures, and to identify and mitigate risks to the organization's data and systems. The Python for Cybersecurity course may be useful for Cybersecurity Consultants as it provides a foundation in Python programming, which is a valuable skill for this role. The course covers topics such as execution, persistence, privilege escalation, and evasion, which are all important concepts for Cybersecurity Consultants to understand.
Cybersecurity Manager
The Cybersecurity Manager is responsible for managing the security of an organization's computer networks and systems. They work to develop and implement security policies and procedures, and to identify and mitigate risks to the organization's data and systems. The Python for Cybersecurity course may be useful for Cybersecurity Managers as it provides a foundation in Python programming, which is a valuable skill for this role. The course covers topics such as execution, persistence, privilege escalation, and evasion, which are all important concepts for Cybersecurity Managers to understand.

Reading list

We've selected seven books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Execution, persistence, privilege escalation and evasion.
A reference guide for Metasploit, a popular penetration testing framework, providing insights into privilege escalation, persistence, and evasion techniques.
A comprehensive guide to malware analysis, providing techniques for detecting and mitigating malware, including persistence and evasion techniques.
A guide to network security assessment, providing techniques for identifying vulnerabilities and mitigating risks, including defense evasion techniques.
A beginner's guide to penetration testing, providing an overview of techniques and tools for privilege escalation, persistence, and evasion.
A comprehensive guide to advanced penetration testing techniques, providing insights into privilege escalation and evasion methods.
A comprehensive guide to computer security incident handling, providing insights into detecting and mitigating security incidents, including persistence and evasion techniques.
A beginner's guide to reverse engineering, providing techniques for analyzing and understanding malicious software and other software.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Similar courses are unavailable at this time. Please try again later.
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser