Chevron Left
返回到 Execution, persistence, privilege escalation and evasion

學生對 信息安全 提供的 Execution, persistence, privilege escalation and evasion 的評價和反饋

4.2
20 個評分
10 條評論

課程概述

This course is a continuation of Python for Cybersecurity. The topics covered are execution, persistence, privilege escalation and evasion....

熱門審閱

KB
2021年5月13日

Very interesting approaches. The ideas are straight to the point. Some recommendations. Author could add extra reading links and text books so we can dig into further.

JP
2021年8月10日

Excellent overview of the uses of Python as a security tool. Not for Python beginners but instructor explains the how and why very well.

篩選依據:

1 - Execution, persistence, privilege escalation and evasion 的 9 個評論(共 9 個)

創建者 Kaio B

2021年5月14日

Very interesting approaches. The ideas are straight to the point. Some recommendations. Author could add extra reading links and text books so we can dig into further.

創建者 Jason P

2021年8月11日

Excellent overview of the uses of Python as a security tool. Not for Python beginners but instructor explains the how and why very well.

創建者 Alan R

2021年11月29日

For me this course is w​ell paced, thought off, planned and clear! Amazing Howard keep it up!

創建者 خالد ا

2021年9月25日

it's amazing course.....

創建者 Maria G

2021年4月30日

Decent but short - for those already working in Cyber. Not for those with no knowledge.

創建者 SANTOSO H

2021年6月26日

Easy to follow.

創建者 Viral P

2021年10月2日

Instructor was so fast

創建者 Christian A

2021年10月19日

I will be super honest for this course, I had to give up, I was really wasting time in boring explanations, a course that is not challenging at all and they did not have imagination to create a lab environment or recommend something nice or challenge (There are really a lot of option out there)

There are videos that are cut in the middle, code that no longer apply and do not work even if you try really hard.

This course concentrates in windows computer (Windows computers!!!!!!) where sometimes things does not for the simple fact that is windows.

The attacks perform are with administrator accounts so obviously it will work.

I would recommend to retired this course and start from scratch. (I do apologize)

創建者 Khaleel O

2021年8月15日

No github. Incomplete videos.