Linux Privilege Escalation
Price: Free
Level: Introductory
Sections: 5
Videos: 14
Duration: 8+ hours

Price: Free
Level: Introductory
Sections: 5
Videos: 14
Duration: 8+ hours
This course covers basic exploitation concepts and vulnerabilities in the context of Linux privilege escalation. It designed for people who are already familiar with linux but with limited experience in the context of linux security. Take this course if you want to build solid foundations over linux privilege escalation. If instead you're already used to the field, this course might showcase a new way of thinking about an exploitation technique you already know.
Participants will learn to identify and exploit common system misconfiguration in the context of linux systems. Participants will also learn the different techniques to enumerate common assets exposed by linux systems. For every exploitation technique analyzed, different hands-on examples are showcased in order to build practical knowledge and intuition.
By the end of the course, participants will develop a deeper understanding over Linux privilege escalation.
Specifically, the following practical skills will be transfered:
As a starting point, we assume the following knowledge: