Linux Kernel Hacking: A to Z
This lecture analyzes various protection techniques in the Linux kernel, methods to bypass them, and various vulnerabilities. Practical examples are provided for each lecture.
(4.8) 32 reviews
644 learners
Level Intermediate
Course period Unlimited
Linux
Linux
System Hacking
System Hacking
Penetration Testing
Penetration Testing
Linux
Linux
System Hacking
System Hacking
Penetration Testing
Penetration Testing
Here is a notice regarding the lecture.
Due to health issues, I am currently experiencing some delays in recording Inflearn lectures. I apologize.
We plan to resume recording within 10 days at the latest, and we will update the lecture schedule soon. We will reward you with higher quality than before.
Also, if you have any questions or concerns regarding the lecture, please leave a question and we will respond as soon as possible.
thank you
Comment




