Course Overview

This course focuses on Linux Privilege Escalation tactics and techniques designed to help you improve your privilege escalation game. Students should take this course if they are interested in:

  • Gaining a better understanding of privilege escalation techniques
  • Improving Capture the Flag skillset
  • Preparing for certifications such as the PNPT, OSCP, eCPPT, CEH, etc.

Requirements

  • Prior beginner hacking knowledge preferred
  • Prior virtualization knowledge preferred
  • Access to a Windows machine is preferred

What will I learn?

1) How to enumerate Linux systems manually and with tools

2) A multitude of privilege escalation techniques, including:

  • Kernel Exploits
  • Password Hunting
  • File Permissions
  • Sudo Attacks
  • Shell Escaping
  • Intended Functionality
  • LD_PRELOAD
  • CVE-2019-14287
  • CVE-2019-18634
  • SUID Attacks
  • Shared Object Injection
  • Binary Symlinks
  • Environment Variables
  • Capabilities Attacks
  • Scheduled Tasks
  • NFS
  • Docker

3) Tons of hands-on experience, including:

  • 11 vulnerable machines total
  • Capstone challenge
  • Custom lab with no installation required


Hacking Into Computer Example
Best 5 Star Review!
Deo Martinez

"Heath does a great job explaining the concepts of pen testing and follows it up with hands-on examples. Its easy to follow his methodology and he gives plenty of advice on some of the common tools to use based on the findings illustrated in his course. Great job, Heath!"

Big 5 Star Review for Linux Escalation
Jacob Surles

"This course is amazing. I have taken other privilege escalation courses and none of them were even close to as engaging and informative as this course. I highly recommend this course."

Customer Testimonial - 5 Star Review
Florin Galaftion

"Excellent ! The Combo Windows/Linux privilege escalation courses was a great investment. Worth every penny and more! The CTFs were well chosen and included a full walk-thru of the techniques presented in lectures. Way to go Heath ! Looking for more coming from you in the near future !"

Course Curriculum - 6.5 Hours


  Introduction
Available in days
days after you enroll
  Lab Overview & Initial Access
Available in days
days after you enroll
  Initial Enumeration
Available in days
days after you enroll
  Exploring Automated Tools
Available in days
days after you enroll
  Escalation Path: Kernel Exploits
Available in days
days after you enroll
  Escalation Path: Passwords & File Permissions
Available in days
days after you enroll
  Escalation Path: Sudo
Available in days
days after you enroll
  Escalation Path: SUID
Available in days
days after you enroll
  Escalation Path: Other SUID Escalation
Available in days
days after you enroll
  Escalation Path: Capabilities
Available in days
days after you enroll
  Escalation Path: Scheduled Tasks
Available in days
days after you enroll
  Escalation Path: NFS Root Squashing
Available in days
days after you enroll
  Escalation Path: Docker
Available in days
days after you enroll
  Capstone Challenge
Available in days
days after you enroll
  Wrapping Up
Available in days
days after you enroll

Choose a Pricing Option

Course Instructor Heath Adams - CEO of TCM Security

About the Instructor


Hi everyone! My name is Heath Adams, but I also go by "The Cyber Mentor" on social media. I am the founder and CEO of TCM Security, an ethical hacking and cybersecurity consulting company. While I am an ethical hacker by trade, I love to teach! I have taught courses to over 170,000 students on multiple platforms, including Udemy, YouTube, Twitch, and INE.

I am currently OSCP, OSWP, eCPPTX, eWPT, CEH, Pentest+, CCNA, Linux+, Security+, Network+, and A+ certified. 

I'm also a husband, animal dad, tinkerer, and military veteran. I hope you enjoy my courses.


Follow Heath on Social Media:

LinkedIn - https://linkedin.com/in/heathadams

Twitter - https://twitter.com/thecybermentor

YouTube - https://youtube.com/c/thecybermentor

Twitch - https://twitch.tv/thecybermentor

Frequently Asked Questions


Can I get a refund if I'm unhappy with my purchase?

Yes. All courses come with a 3-day money-back guarantee.


Will I receive a certificate of completion when I finish a course?

Yes. All courses come with a certificate of completion.


Do the courses count as Continuing Education Units (CEUs)?

Yes. Every certificate of completion comes with the total CEUs earned listed on the certificate.


Do course purchases come with lifetime access?

Yes. You only pay once for our courses!


Can I migrate Udemy courses?

Unfortunately, we cannot migrate users from Udemy to the Academy. Udemy does not provide us with student enrollment information. The Udemy courses do receive quality of life updates and are still supported by our team. We apologize for any inconvenience.


What's the difference between purchasing a course and the All-Access Pass?

When a student purchases a course, either individually or with a bundle, they receive lifetime access to the course and its materials. When a student purchases the All-Access pass subscription, they receive access to all of our courses and content, but the access is removed once the monthly subscription ends.