Skip navigation

On September 14th, 2017, we published revised versions of our Privacy Policy, Terms of Service and Website Use Policy and published a Cookie Policy. Your continued use of Lynda.com means you agree to these revised documents, so please take a few minutes to read and understand them.

Privilege escalation

Privilege escalation: CISSP Cert Prep: 8 Software Development Security
Privilege escalation: CISSP Cert Prep: 8 Software Development Security

Escalation of privilege attacks seek to take normal user accounts and transform them into accounts with administrative rights. This can be especially dangerous on systems that have external exposures, allowing someone on the Internet to take control of a server. In this video, learn how escalation of privilege attacks work and what you can do to prevent them.

Resume Transcript Auto-Scroll
Skill Level Advanced
1h 24m
Duration
28,857
Views
Show More Show Less
Skills covered in this course
Security IT CISSP

Continue Assessment

You started this assessment previously and didn't complete it. You can pick up where you left off, or start over.

Start Your Free Trial Now

Start your free trial now, and begin learning software, business and creative skills—anytime, anywhere—with video instruction from recognized industry experts.

Start Your Free Trial Now