• Classroom
Course Description

Post exploitation is what things to do after the fact, when you have already broken into (hacked) a system. The three main goals of this course are to teach the attendees the steps of Information Gathering, Backdooring and then Covering Up Your Steps.

Learning Objectives

  • Information Gathering
  • Backdooring
  • Covering Steps

    Framework Connections