1 00:00:06,760 --> 00:00:11,060 - Welcome to Lesson 26: Post-Exploitation Techniques. 2 00:00:11,060 --> 00:00:13,260 This lesson starts by introducing 3 00:00:13,260 --> 00:00:15,540 how to maintain persistence 4 00:00:15,540 --> 00:00:17,850 after compromising a system 5 00:00:17,850 --> 00:00:21,603 and how to perform lateral movement and pivoting. 6 00:00:22,540 --> 00:00:27,040 You will gain an understanding on how to cover your tracks 7 00:00:27,040 --> 00:00:28,830 and clean up systems 8 00:00:28,830 --> 00:00:30,963 after a penetration testing engagement.