1 00:00:07,500 --> 00:00:08,640 - [Instructor] Many different attackers 2 00:00:08,640 --> 00:00:11,958 take advantage of numerous local host vulnerabilities 3 00:00:11,958 --> 00:00:14,377 to carry many different attacks. 4 00:00:14,377 --> 00:00:15,940 In the following lessons, 5 00:00:15,940 --> 00:00:17,639 you're actually gonna learn about exploits 6 00:00:17,639 --> 00:00:20,460 against local host vulnerabilities, 7 00:00:20,460 --> 00:00:23,800 like taking advantage of a specific operating system flaws, 8 00:00:23,800 --> 00:00:27,300 escalating privileges, stealing credentials, 9 00:00:27,300 --> 00:00:32,100 installing keyloggers, abusing physical security devices. 10 00:00:32,100 --> 00:00:34,754 You will also learn about different virtual machine 11 00:00:34,754 --> 00:00:37,030 and container vulnerabilities, 12 00:00:37,030 --> 00:00:40,240 and you will also learn about cold boot attacks, 13 00:00:40,240 --> 00:00:43,240 JTAG debugging, and different attacks 14 00:00:43,240 --> 00:00:46,793 that can be carried out over serial console of a device.