Linux Kernel Hacking: A to Z
This lecture analyzes various protection techniques in the Linux kernel, methods to bypass them, and various vulnerabilities. Practical examples are provided for each lecture.
(4.9) 29 reviews
635 learners
Level Intermediate
Course period Unlimited
Linux
Linux
System Hacking
System Hacking
Penetration Testing
Penetration Testing
Linux
Linux
System Hacking
System Hacking
Penetration Testing
Penetration Testing




