Course Overview
Learning Objectives
After completing this course, you will be able to:
- Understand the Dirty Pipe vulnerability and its root cause.
- Identify the Dirty Pipe vulnerability, detect exploits, and determine if your organization is impacted by this Linux kernel flaw.
- Communicate the potential impact to stakeholders across your organization.
- Exploit this vulnerability using publicly available exploit code.
- Execute various mitigation tactics to reduce risk.
- Remediate this vulnerability on both Linux systems and Android devices.
- Share effective exploitation and mitigation strategies.
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):