From the course: Complete Guide to Cybersecurity: A Practical Approach

Unlock this course with a free trial

Join today to access over 24,700 courses taught by industry experts.

Learning objectives

Learning objectives

- Welcome to Lesson 16, Post Exploitation Techniques and Reporting. In this lesson, we're going to go over how to avoid detection and evade different cybersecurity tools that may be in a security operations center, and how you can demonstrate how an attacker can employ different obfuscation techniques to bypass the security controls and monitoring tools that an organization may have. You're going to also learn about lateral movement, exfiltration, command and control, and also the concepts of living-off-the-land and fileless malware. We're going to go over different best practices on how to effectively create penetration testing reports and bug bounty reports as well. At the end, we're going to go over different post-engagement cleanup activities that are very important within your assessment. Let's get started.

Contents