Skip navigation

Privilege escalation

Privilege escalation: CISSP Cert Prep: 8 Software Development Security
Privilege escalation: CISSP Cert Prep: 8 Software Development Security

Escalation of privilege attacks seek to take normal user accounts and transform them into accounts with administrative rights. This can be especially dangerous on systems that have external exposures, allowing someone on the Internet to take control of a server. In this video, learn how escalation of privilege attacks work and what you can do to prevent them.

Resume Transcript Auto-Scroll
Skill Level Advanced
1h 24m
Duration
17,718
Views
Show More Show Less
Skills covered in this course
Security IT CISSP

Continue Assessment

You started this assessment previously and didn't complete it. You can pick up where you left off, or start over.

Start Your Free Trial Now

Start your free trial now, and begin learning software, business and creative skills—anytime, anywhere—with video instruction from recognized industry experts.

Start Your Free Trial Now