Course Overview

This course focuses on Linux Privilege Escalation tactics and techniques designed to help you improve your privilege escalation game. Students should take this course if they are interested in:


Prerequisites & System Requirements

  • Prior beginner hacking knowledge preferred
  • Prior virtualization knowledge preferred
  • Access to a Windows machine is preferred


Linux Privilege Escalation Course Objectives


What will I learn?

1) How to enumerate Linux systems manually and with tools

2) A multitude of privilege escalation techniques, including:

  • Kernel Exploits
  • Password Hunting
  • File Permissions
  • Sudo Attacks
  • Shell Escaping
  • Intended Functionality
  • LD_PRELOAD
  • CVE-2019-14287
  • CVE-2019-18634
  • SUID Attacks
  • Shared Object Injection
  • Binary Symlinks
  • Environment Variables
  • Capabilities Attacks
  • Scheduled Tasks
  • NFS
  • Docker

3) Tons of hands-on experience, including:

  • 11 vulnerable machines total
  • Capstone challenge
  • Custom lab with no installation required
Hacking Into Computer Example

What Our Students Are Saying

Best 5 Star Review!
Deo Martinez

"Heath does a great job explaining the concepts of pen testing and follows it up with hands-on examples. Its easy to follow his methodology and he gives plenty of advice on some of the common tools to use based on the findings illustrated in his course. Great job, Heath!"

Big 5 Star Review for Linux Escalation
Jacob Surles

"This course is amazing. I have taken other privilege escalation courses and none of them were even close to as engaging and informative as this course. I highly recommend this course."

Customer Testimonial - 5 Star Review
Florin Galaftion

"Excellent ! The Combo Windows/Linux privilege escalation courses was a great investment. Worth every penny and more! The CTFs were well chosen and included a full walk-thru of the techniques presented in lectures. Way to go Heath ! Looking for more coming from you in the near future !"

Linux Privilege Escalation Course Curriculum - 6.5 Hours

  Introduction
Available in days
days after you enroll
  Lab Overview & Initial Access
Available in days
days after you enroll
  Initial Enumeration
Available in days
days after you enroll
  Exploring Automated Tools
Available in days
days after you enroll
  Escalation Path: Kernel Exploits
Available in days
days after you enroll
  Escalation Path: Passwords & File Permissions
Available in days
days after you enroll
  Escalation Path: Sudo
Available in days
days after you enroll
  Escalation Path: SUID
Available in days
days after you enroll
  Escalation Path: Other SUID Escalation
Available in days
days after you enroll
  Escalation Path: Capabilities
Available in days
days after you enroll
  Escalation Path: Scheduled Tasks
Available in days
days after you enroll
  Escalation Path: NFS Root Squashing
Available in days
days after you enroll
  Escalation Path: Docker
Available in days
days after you enroll
  Capstone Challenge
Available in days
days after you enroll
  Wrapping Up
Available in days
days after you enroll
Course Instructor Heath Adams - CEO of TCM Security

About the Instructor: Heath Adams

Hi everyone! My name is Heath Adams, but I also go by "The Cyber Mentor" on social media. I am the founder and CEO of TCM Security, an ethical hacking and cybersecurity consulting company. While I am an ethical hacker by trade, I love to teach! I have taught courses to over 170,000 students on multiple platforms, including Udemy, YouTube, Twitch, and INE.

I am currently OSCP, OSWP, eCPPTX, eWPT, CEH, Pentest+, CCNA, Linux+, Security+, Network+, and A+ certified. 

I'm also a husband, animal dad, tinkerer, and military veteran. I hope you enjoy my courses.


Follow Heath on Social Media:

LinkedIn - https://linkedin.com/in/heathadams

Twitter - https://twitter.com/thecybermentor

YouTube - https://youtube.com/c/thecybermentor

Twitch - https://twitch.tv/thecybermentor

all-access membership wolf logo

This course is included in our
All-Access Membership
starting at $29.99/month

Get full access to the Linux Privilege Escalation for Beginners course and our full course catalog when you enroll in our All-Access Membership.

Frequently Asked Questions


Can I get a refund if I'm unhappy with my purchase?

Yes. All courses come with a 24-hour money-back guarantee.


Will I receive a certificate of completion when I finish a course?

Yes. All courses come with a certificate of completion.


Do the courses count as Continuing Education Units (CEUs)?

Yes. Every certificate of completion comes with the total CEUs earned listed on the certificate.


What is the All-Access Pass?

As of July 1st, 2023 TCM Academy transitioned to a monthly subscription model, where you now receive full access to all of the courses on our platform for as long as your subscription remains active.


What if you already own courses on TCM Academy?

If you already own a course on our platform, you will continue to own that course forever. Previously owned courses will not be affected by this change.


I can see the course, but it won’t load or play. What should I do?

We use Cloudflare to protect our course platform and unfortunately, it does not play nice with VPNs. If you are experiencing issues, turn off your VPN and try again. If that does not solve the issue, please contact our support team at [email protected] and we will help you out.