TRAINING COURSES

HOME   /   TRAINING   /   LINUX KERNEL INTERNALS & DEVELOPMENT

Linux Kernel Internals & Development

Instructed by T. Roy

The goal of this course is to enable students to develop and debug loadable kernel modules that extend the functionality of the modern 64-bit version Linux kernel. LKID focuses on the skills of investigating the internals of the Linux kernel and the development and debugging of Linux loadable kernel modules. Students learn how to use built in tools to peer into the internals of the Linux kernel, call Linux kernel programming interfaces and build, test and debug Linux loadable kernel modules.

Classes are limited. Get registered!

Learning Objectives

  • Describe the different components of the Linux kernel.
  • Develop, build, test and debug Linux kernel modules.
  • Implement security related functionality in kernel modules.
  • Be able to navigate between different data structures in the kernel using debugger commands.
  • Identify the kernel programming interfaces to solve a given development task.
  • Retrieve information from the kernel using various commands.
  • Examine crash dumps and identify the cause of the crash.
  • Build the foundation to attend the Linux Kernel Exploitation and Rootkit training (LKXR).

Students’ Knowledge Pre-Requisites:

  • Proficient in C programming language.
  • Knowledge of C programming constructors such as pointers, structures, arrays and linked lists.
  • Comfortable with Linux command line tools.
  • Familiar with Linux development tools such as gcc and make.
  • Knowledge of operating system concepts such as process, thread, virtual memory, heaps, stacks, files, system calls, daemons etc.
windows-kernal-internals-development
  • LEVEL

Advanced

  • FORMAT

Live-Online & In-Person

  • LOCATION

Live Online / Columbia, MD / Irvine, CA

  • DURATION

5 days

  • TARGET AUDIENCE

Anti-malware engineers, malware analysts, forensics examiners, security researchers who are responsible for detecting, analyzing, and defending against rootkits and other kernel post exploitation techniques.

  • Standard Rate

Why choose the Center for Cyber Security Training

Interactive, classroom-based learning

Subject matter experts

Trusted by US government agencies

t-roy
T.Roy

T.Roy, an author, instructor, and consultant, is the founder of CodeMachine. He has more than 20 years of experience in information security has been involved with Windows internals, development, debugging and security, since the inception of Windows NT in 1992. He has been involved in the development of some of the leading endpoint security solutions such as intrusion prevention, network firewalls, behavioral anti-malware, document security and data leak prevention systems. He has taught all over the world and has received many instructor recognition awards.

I really enjoyed the course! It was interesting to see a different perspective on penetration testing and ways of progressing from recon to initial access to escalating privilege and lateral movement.

- Robert L., Washington, DC

Want more information?

Download the Linux Kernel Internals & Development course outline now.

Upcoming Training Sessions

February 7-11, 2022 (Live-Online)

Classes are limited.

Enroll Now.

Related Courses

Our classroom delivers the most in-demand content from the highest profile subject matter experts. Intense and interactive, our courses prepare students with actionable insight and proven strategies.

windows internal architecture

Windows Internal Architecture

Whether you analyze malware, perform security research, conduct forensic investigations, engage in adversary simulation or prevent it, or build security solutions for Windows, understanding how Windows works internally is critical to be effective at your task.

exploit-development-bootcamp

Exploit Development Bootcamp & Advanced

Our three-day Bootcamp will teach both basic & advanced techniques from a leading exploit developer. In our Advanced course, experienced students will learn how to write exploits that bypass modern memory protections for the Win32 platform in a fast-paced, interactive learning environment.

Looking for a course that's not here? We'd love to hear your suggestions!

Are you fully prepared to deal with today's increasing cyber security risks? We can help you get the training you need.

TRAINING INQUIRY

*We respect your privacy