Course description

Linux Privilege Escalation is a critical skill set for cybersecurity professionals, penetration testers, and ethical hackers operating in both red team and bug bounty environments. This discipline focuses on identifying and exploiting weaknesses in Linux systems that allow attackers to gain elevated access — from a regular user to root or administrative control. Practitioners learn to understand Linux internals, kernel and service vulnerabilities, misconfigurations, weak permissions, and credential leaks to simulate real-world attack scenarios. Ethical hackers use privilege escalation techniques responsibly, under authorized conditions, to assess and strengthen system defenses, ensuring organizations can detect and remediate threats before malicious actors exploit them.

What will i learn?

  • 01 : Privilege Escalation in Linux – Theory
  • 02 : 'Kernel' Exploits – Theory, Lab
  • 03 : 'Service' Exploits – Theory, Lab
  • 04 : 'Weak File Permissions' Exploits – Theory, Lab
  • 05 : 'Sudo' Exploits – Theory, Lab
  • 06 : 'Cron Jobs' Exploits – Theory, Lab
  • 07 : 'SUID or SGID' Exploits – Theory, Lab
  • 08 : 'Passwords and Keys' Exploits – Theory, Lab
  • 09 : 'Network File System' Exploits – Theory, Lab
  • 10 : Privilege Escalation Tools – Theory, Lab

Requirements

  • Basic knowledge on System Hacking
  • The student must be above 18 years of age.

Frequently asked question

Linux Privilege escalation is used when an attacker has access to a regular user account and uses that account to gain access to the root user.

Security Officers, IT Auditors, Security Professionals, Site Administrators, Anyone who is concerned about the integrity of the information technology infrastructure, and individuals who are highly passionate about hacking.

Ethical Hacker,
Bug Hunter,
IT Security Specialist,
IT Security Consultant,
Network Security Specialist,
Penetration Tester,
Information Security Engineer,
Cyber Security Engineer.

Khadija Begum

27-Sep-2025

5

I never thought privilege escalation could be this cool.

Nazmul Islam

26-Sep-2025

5

রেড টিম ক্যারিয়ারের জন্য অবশ্যই দরকারি কোর্স

Laila Khatun

26-Sep-2025

5

Hands-on exercises chilo challenge + fun

Sajjad Ahmed

25-Sep-2025

5

I finally understood lateral movement in enterprise networks

Sultana Akhtar

24-Sep-2025

4

Adversarial thinking er idea build hoise!

Alamgir Haque

24-Sep-2025

5

রেড টিম রোলের প্রস্তুতির জন্য সেরা কোর্স

Fatima Akhtar

23-Sep-2025

5

Best course for anyone preparing for red team roles

Milon Mollah

22-Sep-2025

5

-focus and practical training-

Rajib Hassan Khan

22-Sep-2025

5

Short but powerful learning

Nilima Akter Nilu

21-Sep-2025

5

Hands-on task gulo fun chilo

Raisul Al-Amin

21-Sep-2025

5

ল্যাব সেশন গুলো মজার ছিল

Dulal Maula

20-Sep-2025

5

Instructor support onek helpful chilo.

IFTI HASAN

19-Sep-2025

4

ধাপে ধাপে শেখানো হয়েছে

Rani Khatun

18-Sep-2025

5

Learning experience khub enjoyable.

Wasi Ullah Robin

17-Sep-2025

5

Covers red team concepts briefly but effectively.

Kuranal Dev Nath

16-Sep-2025

5

Great content, very easy to digest.

Labib Al Hasan

15-Sep-2025

5

Threat hunting e khub valo training.

Sharif Rahman

14-Sep-2025

5

Ei training amar jonne khub upokari hoise.

Sajal Islam

14-Sep-2025

5

প্রচুর ধোর্য লাগবে লাগসে কিন্তু শিখতে পেরেছি অনেক কিছু

Tamanna Islam

27-Aug-2025

5

bhalo coursee recommend korar moto

16-Aug-2025

5

Rokib Rahman

24-Jul-2025

5

Depth of Linux Hacking

Tanvir Rahman

30-Jun-2025

5

NAZIM UDDIN

Mr. NAZIM is currently serving as Manager of the Technology Security Division at Financial Organization. In this role, he develops, implements, and manages IT infrastructure and network security strategies, conduct internal IT audits, threat hunting, maintain PCI and ISO compliance, incident response, and guide the IT team while ensuring continuous improvement and security best practices. He has extensive experience working across diverse industry projects, including Government Organizations, Payment System Operator, IIGs, ISPs, Law Enforcement Agencies, Insurance, Banks, Finance, Corporations, and NGOs. In addition he holds industry certifications such as Network+, CEH (Master), CPENT, LPT (Master), OSCP, BSCP, and ISO/IEC 27001:2022 Lead Auditor also. He is ranked 20th out of 5M+ participants globally on the well-known CTF platform TryHackMe and has successfully exploited over 1200+ systems.

৳2950

Lectures

44

Skill level

Intermediate

Expiry period

Lifetime

Related courses