Common security vulnerabilities in Linux Course

In this course, we discuss common security misconfigurations which lead to privilege escalation in the Linux operating system.

45 minutes

Course description

This course dives into common security vulnerabilities in Linux. We’ll explore privilege escalation (going from a standard user to a privileged user), overly permissive files and directories and exploiting sudo and SUID permissions.

Syllabus

SUID

Video - 00:18:00

Discuss suid in Linux operating systems.
Sudo

Video - 00:11:00

Discuss sudo in Linux operating systems.
Overly permissive files

Video - 00:13:00

Discuss overly permissive files in Linux operating systems.
Common security vulnerabilities in Linux

Video - 00:02:00

A look at the agenda for this section.

Meet the author

Jasmine Jackson

Jasmine shares her passion for Information Security by presenting and teaching workshops over ten years of experience. She is an Adjunct Professor at the City University of Seattle with additional courses at Cybrary and Infosec Institute. She has Secure Programming, Web Application Pentesting, and Cloud Security certifications. She has a Master’s in Computer Science and a Graduate Certificate in Information Security and Privacy from the University of North Carolina, Charlotte. She has presented her work domestically and internationally for such conferences - As the Diana Initiative, Bugcrowd, Blacks in Cybersecurity, Biohacking Village, and NotPinkCon on Mobile Security and Web Application Security. Besides Jasmine’s passion for teaching, she has a hunger for breaking barriers and biases to entry for the next generation of Information Security professionals by creating her non-profit, The Accelerated Training Program (T-ATP), t-atp.org, whose mission statement is to study the systemic exclusion of cybersecurity education to underrepresented groups through education policy along with providing quality cybersecurity education. In her spare time, she likes to stay updated on security vulnerabilities by completing capture the flag write-ups on her blog, thefluffy007.com, submitting vulnerability disclosures, and creating cybersecurity education content on her YouTube channel.

Unlock 7 days of free training

  • 1,400+ hands-on courses and labs
  • Certification practice exams
  • Skill assessments

Plans & pricing

Infosec Skills Personal

$299 / year

  • 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Custom certification practice exams (e.g., CISSP, Security+)
  • Skill assessments
  • Infosec peer community support

Infosec Skills Teams

$799 per license / year

  • Team administration and reporting
  • Dedicated client success manager
  • Single sign-on (SSO)
    Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
  • Integrations via API
    Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
  • 190+ role-guided learning paths and assessments (e.g., Incident Response)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Create and assign custom learning paths
  • Custom certification practice exams (e.g., CISSP, CISA)
  • Optional upgrade: Guarantee team certification with live boot camps

Learn about scholarships and financing with

Affirm logo

Award-winning training you can trust