Advanced Linux Kernel Internals provides comprehensive coverage of the key functional areas of Linux kernel rootkits through a practical hands-on approach. Dive into techniques used by malicious kernel mode software to abuse Linux kernel subsystems and their programming interfaces to achieve their goals. This course also covers the security functionality and mitigations in the latest Linux kernel.
Learning Objectives
- Identify kernel components and programming interfaces used to compromise a system.
- Develop shellcode that executes in the kernel.
- Develop Linux kernel modules that provide offensive security functionality.
- Implement key components of a kernel rootkit.
- Recognize security related enhancements in the modern Linux kernel.
- Analyze a Linux system to find and identify malicious activity.
- Configure a Linux system to improve the system's security posture.
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):
Competency Areas
Feedback
If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.