We may earn an affiliate commission when you visit our partners.
Course image
Course image
Coursera logo

Execution, persistence, privilege escalation and evasion

Howard Poston

This course is a continuation of Python for Cybersecurity. The topics covered are execution, persistence, privilege escalation and evasion.

Enroll now

What's inside

Syllabus

Python for execution
A look at Python and Code execution.
Python for persistence
Explore the details of using Python for persistence
Read more
Python for privilege escalation
Exploring privilege escalation with Python
Python for defense evasion
Explore the details of using Python for defense evasion.

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Examines command execution using Python
Explores persistence techniques using Python
Demonstrates privilege escalation using Python
Illustrates defense evasion techniques using Python
Suitable for learners with prior experience in Python programming
Likely helpful for cybersecurity professionals

Save this course

Save Execution, persistence, privilege escalation and evasion to your list so you can find it easily later:
Save

Reviews summary

Engaging course on privilege escalation

According to students, this course is well received and provides engaging assignments with great insights into cybersecurity. The instructor is clear in their explanations, and the content is well paced. While the course focuses on Windows systems, it also addresses security concerns for Linux, which allows learners to explore different operating systems. Overall, students find this course to be a valuable learning experience.
Instructor provides clear explanations
"The instructor was very clear in his explaining of the various concepts that were being covered"
"Excellent overview of the uses of Python as a security tool. Not for Python beginners but instructor explains the how and why very well."
Includes MITRE framework and real-life examples
"The introduction to the MITRE framework is great and the selection of MITRE techniques to be studied in the exercices is great as well."
"Explanations about cybersecurity stuff are crystal clear."
"Courses always follow the same pattern : content flows from theory to an in-depth use-case ending logically with a Python example that is a very good illustration."
Some videos are incomplete or cut off
"Quality control issues (videos incomplete)."
"There are videos that are cut in the middle, code that no longer apply and do not work even if you try really hard."
Course primarily focuses on Windows systems
"This course concentrates in windows computer (Windows computers!!!!!!) where sometimes things does not for the simple fact that is windows."
"The attacks perform are with administrator accounts so obviously it will work."

Activities

Coming soon We're preparing activities for Execution, persistence, privilege escalation and evasion. These are activities you can do either before, during, or after a course.

Career center

Learners who complete Execution, persistence, privilege escalation and evasion will develop knowledge and skills that may be useful to these careers:
Penetration Tester
The Penetration Tester is responsible for testing the security of computer networks and systems. They use a variety of techniques to identify vulnerabilities and weaknesses in security systems. This includes using Python programming to write scripts and tools to test for vulnerabilities. The Python for Cybersecurity course may be useful for Penetration Testers as it provides a foundation in Python programming and covers topics such as execution, persistence, privilege escalation, and evasion, which are all important concepts for Penetration Testers to understand.
Ethical Hacker
The Ethical Hacker is responsible for testing the security of computer networks and systems to identify vulnerabilities and weaknesses. They work with organizations to develop and implement security measures to protect their data and systems from unauthorized access. The Python for Cybersecurity course may be useful for Ethical Hackers as it provides a foundation in Python programming, which is a valuable skill for this role. The course covers topics such as execution, persistence, privilege escalation, and evasion, which are all important concepts for Ethical Hackers to understand.
Malware Analyst
The Malware Analyst is responsible for analyzing malware to identify its purpose and behavior. They work to develop and implement strategies to detect and prevent malware infections. This includes using Python programming to write scripts and tools to analyze malware samples. The Python for Cybersecurity course may be useful for Malware Analysts as it provides a foundation in Python programming and covers topics such as execution, persistence, privilege escalation, and evasion, which are all important concepts for Malware Analysts to understand.
Security Researcher
The Security Researcher is responsible for conducting research into new security threats and vulnerabilities. They work to develop new security tools and techniques to protect organizations from cyber threats. This includes using Python programming to write scripts and tools to automate security research tasks. The Python for Cybersecurity course may be useful for Security Researchers as it provides a foundation in Python programming and covers topics such as execution, persistence, privilege escalation, and evasion, which are all important concepts for Security Researchers to understand.
Forensic Analyst
The Forensic Analyst is responsible for investigating computer crimes and cyberattacks. They work to collect and analyze evidence from computer systems and networks to identify the perpetrators of cybercrimes. This includes using Python programming to write scripts and tools to automate forensic analysis tasks. The Python for Cybersecurity course may be useful for Forensic Analysts as it provides a foundation in Python programming and covers topics such as execution, persistence, privilege escalation, and evasion, which are all important concepts for Forensic Analysts to understand.
Vulnerability Analyst
The Vulnerability Analyst is responsible for identifying and assessing vulnerabilities in software and systems. They work to develop and implement strategies to mitigate vulnerabilities and protect organizations from cyber threats. This includes using Python programming to write scripts and tools to automate vulnerability assessment tasks. The Python for Cybersecurity course may be useful for Vulnerability Analysts as it provides a foundation in Python programming and covers topics such as execution, persistence, privilege escalation, and evasion, which are all important concepts for Vulnerability Analysts to understand.
Incident Responder
The Incident Responder is responsible for responding to security incidents. They work to identify the source of the incident, contain the damage, and restore the organization's systems to normal operation. This includes using Python programming to write scripts and tools to automate incident response tasks. The Python for Cybersecurity course may be useful for Incident Responders as it provides a foundation in Python programming and covers topics such as execution, persistence, privilege escalation, and evasion, which are all important concepts for Incident Responders to understand.
Information Security Analyst
The Information Security Analyst designs and implements security measures to protect an organization's computer networks and systems. They work to identify and mitigate risks to the organization's data and systems. This includes implementing security policies and procedures, monitoring networks for suspicious activity, and responding to security incidents. The Python for Cybersecurity course may be useful for Information Security Analysts as it provides a foundation in Python programming, which is a valuable skill for this role. The course covers topics such as execution, persistence, privilege escalation, and evasion, which are all important concepts for Information Security Analysts to understand.
Cybersecurity Auditor
The Cybersecurity Auditor is responsible for auditing an organization's security systems and practices to ensure compliance with security regulations and standards. They work to identify and assess risks to the organization's data and systems and to make recommendations for improvements to the organization's security posture. The Python for Cybersecurity course may be useful for Cybersecurity Auditors as it provides a foundation in Python programming, which is a valuable skill for this role. The course covers topics such as execution, persistence, privilege escalation, and evasion, which are all important concepts for Cybersecurity Auditors to understand.
DevSecOps Engineer
The DevSecOps Engineer is responsible for integrating security into the software development lifecycle. They work to identify and assess risks to software applications and to develop and implement security solutions to mitigate those risks. The Python for Cybersecurity course may be useful for DevSecOps Engineers as it provides a foundation in Python programming, which is a valuable skill for this role. The course covers topics such as execution, persistence, privilege escalation, and evasion, which are all important concepts for DevSecOps Engineers to understand.
Security Engineer
The Security Engineer designs, implements, and maintains security systems for organizations. They work to protect the organization's data and systems from unauthorized access, use, disclosure, disruption, modification, or destruction. This includes implementing security policies and procedures, monitoring networks for suspicious activity, and responding to security incidents. The Python for Cybersecurity course may be useful for Security Engineers as it provides a foundation in Python programming, which is a valuable skill for this role. The course covers topics such as execution, persistence, privilege escalation, and evasion, which are all important concepts for Security Engineers to understand.
Cloud Security Engineer
The Cloud Security Engineer is responsible for securing cloud-based applications and infrastructure. They work to identify and assess risks to cloud-based systems and to develop and implement security solutions to mitigate those risks. The Python for Cybersecurity course may be useful for Cloud Security Engineers as it provides a foundation in Python programming, which is a valuable skill for this role. The course covers topics such as execution, persistence, privilege escalation, and evasion, which are all important concepts for Cloud Security Engineers to understand.
Security Architect
The Security Architect is responsible for designing and implementing the security architecture for an organization. They work to identify and assess risks to the organization's data and systems and to develop and implement security solutions to mitigate those risks. The Python for Cybersecurity course may be useful for Security Architects as it provides a foundation in Python programming, which is a valuable skill for this role. The course covers topics such as execution, persistence, privilege escalation, and evasion, which are all important concepts for Security Architects to understand.
Cybersecurity Consultant
The Cybersecurity Consultant provides advice and guidance to organizations on how to protect their computer networks and systems from cyber threats. They work with organizations to develop and implement security policies and procedures, and to identify and mitigate risks to the organization's data and systems. The Python for Cybersecurity course may be useful for Cybersecurity Consultants as it provides a foundation in Python programming, which is a valuable skill for this role. The course covers topics such as execution, persistence, privilege escalation, and evasion, which are all important concepts for Cybersecurity Consultants to understand.
Cybersecurity Manager
The Cybersecurity Manager is responsible for managing the security of an organization's computer networks and systems. They work to develop and implement security policies and procedures, and to identify and mitigate risks to the organization's data and systems. The Python for Cybersecurity course may be useful for Cybersecurity Managers as it provides a foundation in Python programming, which is a valuable skill for this role. The course covers topics such as execution, persistence, privilege escalation, and evasion, which are all important concepts for Cybersecurity Managers to understand.

Reading list

We've selected seven books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Execution, persistence, privilege escalation and evasion.
A reference guide for Metasploit, a popular penetration testing framework, providing insights into privilege escalation, persistence, and evasion techniques.
A comprehensive guide to malware analysis, providing techniques for detecting and mitigating malware, including persistence and evasion techniques.
A guide to network security assessment, providing techniques for identifying vulnerabilities and mitigating risks, including defense evasion techniques.
A beginner's guide to penetration testing, providing an overview of techniques and tools for privilege escalation, persistence, and evasion.
A comprehensive guide to advanced penetration testing techniques, providing insights into privilege escalation and evasion methods.
A comprehensive guide to computer security incident handling, providing insights into detecting and mitigating security incidents, including persistence and evasion techniques.
A beginner's guide to reverse engineering, providing techniques for analyzing and understanding malicious software and other software.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Similar courses are unavailable at this time. Please try again later.
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser