By the end of this course, you will have built an understanding of how the Linux kernel interoperates with glibc and the rest of the binary toolchain. This, in turn, will enlighten your understanding of how various software packages rely on the kernel and glibc to provide interfaces and services, as well as the “why” behind many of the features and idiosyncrasies of the kernel and glibc.
BYOL: Build Your Own Linux From Scratch
$3.00
Description
Size: 1.27 GB
Related products
Security , Shop
SANS SEC564: Red Team Exercises and Adversary Emulation
In SEC564, you will learn how to plan and execute an end-to-end adversary emulation, including how to plan and build a red team program, leverage threat intelligence to map against adversary tactic, techniques, and procedures (TTPs), emulate those TTPs, report and analyze the results of red team exercises, and ultimately improve the overall security posture of the organization.
You …
Security , Shop
eLearnSecurity – Threat Hunting Professional v2
Course at a glance
- Establish a proactive defense mentality
- Hunt for threats in your organization’s systems and network
- Use threat intelligence or hypotheses to hunt for known and unknown threats
- Inspect network traffic and identify abnormal activity in it
- Perform memory forensics using Redline, Volatility and a variety of tools to identify in-memory malware
- Use tools such as Sysmon and …
Security , Shop
Antivirus Evasion Course By DedSec (In Hindi)
Course Topic
- Introduction of AVS Crypters & Virus
- Bypass AVS Runtime using Based64 Technique
- Signature Cloning Bypassing Runtime
- Bypass Windows Defender For Lifetime
- Make your Stub Clean
- Manually Encrypting Virus using Algorithm
- Using Different Algorithm For Cleaning Virus
- Making FUD Virus Using C# And HEX
- Code Your Own Crypter
- Android Botnet
HOMEPAGE – https://www.dedseec.com/product/antivirus-evasion-professional-course/
Original Price: $25
Our Price: $5
Security , Shop
eLearnSecurity – Practical Web Defense
Course at a glance
- Close the gap between Web application attack and defense
- Mitigation advices for multiple platforms and languages
- The most comprehensive and practical coverage of the OWASP Testing Guide
- Comprehensively aligned to OWASP methodologies, tools and tests
- Covers and goes beyond OWASP TOP 10
- Detailed techniques and methodology to simplify defense of web applications
- No boring theory: practice oriented curriculum
…