25.8.20
This website uses cookies to ensure you get the best experience on our website. Learn more

Linux Exploits & Mitigation: Program Essentials

Skillsoft issued completion badges are earned based on viewing the percentage required or receiving a passing score when assessment is required. Navigating the space between userland and kernel and how it impacts how programs reside and execute inside of an operating system can lead to a better understanding of how it's exploited. Being able to debug, disassemble, and dump programs are essential to finding vulnerabilities. In this course, you'll investigate the structure of the Linux kernel, system calls, and program interfaces by running, debugging, and disassembling code. You'll explore how programs fit in memory and how they are protected and executed. You'll debug and disassemble code into its assembly for inspection. Next, you'll explore the GNU C implementation of the standard library and interface using syscalls and the Linux system call table. Finally, you'll explore how programs and scripts are executed and how they are segmented in memory.

Issued on

February 22, 2022

Expires on

Does not expire