DG NSOS – Secure Operating System
Back to Dashboard
Hey there, great course, right? Do you like this course?
All of the most interesting lessons further. In order to continue you just need to purchase it
Get course
$3,000
Course sections
Section 1
Linux Foundation to Advanced Program (Module 1)
1
Introduction of Linux using RHEL and KALI Distros
2
Installation and Configuration of RedHat & Kali.
3
Get Familiar with GUI, Commands and Shell environments.
4
Configure and Manage users, groups and user security policies.
5
Configure and Manage Networks and Storage.
6
Install and update software packages.
Section 2
Linux Expert Program for System Administration (Module 2)
1
Configure and Manage System services, daemons and Drivers.
2
Configure and Manage DNS Server
3
Configure and Manage Email Server
4
Configure and Manage Web Server.
5
Configure and Manage Database Server.
6
Configure and Manage bash scripts, conditionals and control structures.
7
Access network-attached storage.
8
Configure link aggregation and bridging
9
Manage Network security and SELinux security
10
Configure the shell environment
11
Patch Management.
Section 3
Linux Expert Program for Virtualization and Cloud Computing (Module 3)
1
Install, configure and Manage Red Hat Virtualization.
2
Configure and Manage data centers, clusters, user accounts and roles.
3
Design, scale, Configure and Manage Virtualization infrastructure.
4
Configure and Manage Red Hat Virtualization networks and storage.
5
Deploy, manage and Migrate virtual machines and images.
6
Patch and upgrade Red Hat Virtualization, Back up and restore
7
Introduction to Red Hat OpenStack Platform
8
Configure and Manage OpenStack networking and resources.
9
Configure and Manage OpenStack application projects in a multitenant cloud.
10
Automate customized cloud application launches and placement.
Section 4
Linux Expert Program for Security Admins, Ethical Hackers and VAPT Engineers (Module 4)
1
Securing Red Hat Enterprise Linux
2
Security hardening for Red Hat Enterprise Linux.
3
Using SELinux and Securing networks in RedHat.
4
Configuring firewalls and packet filters in RedHat.
5
Deep dive into VAPT concepts, methodology and report writing.
6
Mastering Kali Linux
7
Mastering Metasploit.
Section 5
Deep Dive Linux System Internals, Architecture and Kernel (Module 5)
1
Introduction to the Linux Kernel
2
Process Management and Scheduling.
3
System Calls.
4
Kernel Data Structures
5
Interrupts and Interrupt Handlers
6
Interrupts and Interrupt Handlers
7
Linux Kernel Synchronization and Methods
8
Timers and Time Management.
9
Memory Management.
10
The Virtual Filesystem.
11
The Block I/O Layer.
12
The Process Address Space
13
The Page Cache and Page Writeback.
14
Devices and Modules.
15
Debugging.
Section 6
Linux advanced system hacking techniques, exploit development and execution (Module 6)
1
Introduction to Kernel Exploits
2
Setting up the debugging environment
3
Privilege escalation
4
Arbitrary read/write primitives.
5
Kernel memory addressing disclosures
6
read/write primitives.
7
Out of bounds (OOB) access vulnerabilities.
8
Integer vulnerabilities.
9
Kernel stack overflows
10
Heap vulnerabilities.
11
Kernel return-oriented programming (ROP)
12
Supervisor Mode Execution Protection / Access Protection / Kernel Page Table Isolation bypasses.
Section 7
Linux advanced Optimization and Troubleshooting skills and techniques (Module 7)
1
Troubleshooting Best Practices.
2
Linux troubleshooting: methods and tools for diagnostics.
3
System Access Troubleshooting.
4
File System Troubleshooting
5
System Administration Troubleshooting
6
Backup, System Recovery and Disaster Recovery.
7
Linux Performance Optimization: Tools and Techniques
Questions
My Question
{{ comment.replies_count }}
Send
Load More
Back to Q&A List
Add Comment
{{ message }}
Send
Linux advanced system hacking techniques, exploit development and execution (Module 6)
Heap vulnerabilities.
Lesson is locked. Please Buy course to proceed.
Linux advanced system hacking techniques, exploit development and execution (Module 6)
Kernel stack overflows
Complete
Linux advanced system hacking techniques, exploit development and execution (Module 6)
Kernel return-oriented programming (ROP)
×
This website uses cookies and asks your personal data to enhance your browsing experience.
Ok, I agree
Privacy Policy
Questions
My Question