25.8.20
This website uses cookies to ensure you get the best experience on our website. Learn more

Linux Exploits & Mitigation: Linux Exploit Architecture

Marius Tapirlea

Skillsoft issued completion badges are earned based on viewing the percentage required or receiving a passing score when assessment is required. Vulnerabilities vary by architecture and family of processor. Recognizing the processor implementations and the differences that lead to an exploit is essential. In this course, you'll explore different classes of vulnerabilities based on the computing environment. You'll learn about the architectural differences and system implementations that lead to race conditions, shellcode and out-of-order execution vulnerabilities. You'll explore mitigations and protections to prevent stack smashing, use-after-free, and integer vulnerabilities. Next, you'll examine contemporary exploits such as Spectre and Meltdown and mitigations provided by Write XOR Execute (W^X). Finally, you'll investigate protections to prevent privileged escalation and exploiting processes and tasks.

Issued on

April 30, 2022

Expires on

Does not expire