Skip navigation

Privilege escalation

Privilege escalation: CISSP Cert Prep: 8 Software Development Security (2015)
Privilege escalation: CISSP Cert Prep: 8 Software Development Security (2015)

Escalation of privilege attacks seek to take normal user accounts and transform them into accounts with administrative rights. This can be especially dangerous on systems that have external exposures, allowing someone on the Internet to take control of a server. In this video, learn how escalation of privilege attacks work and what you can do to prevent them.

Resume Transcript Auto-Scroll
Skill Level Advanced
1h 24m
Duration
74,690
Views
Show More Show Less
Skills covered in this course
Security IT CISSP

Continue Assessment

You started this assessment previously and didn't complete it. You can pick up where you left off, or start over.

Start My Free Month

Start your free month on LinkedIn Learning, which now features 100% of Lynda.com courses. Develop in-demand skills with access to thousands of expert-led courses on business, tech and creative topics.

Start My Free Month