Presenter Photo

Featuring guest speaker, Linux hacker, Co-Founder and CTO of InGuardians, Jay Beale

In this all-demo webinar, Jay Beale, CTO of InGuardians, will hack through five different capture the flag environments to demonstrate privilege escalation weaknesses and attack methods on Linux. After he compromises each environment, he'll show you how to protect against its privilege escalation risks. Afterward, use Docker on Linux to pull down each environment from Docker Hub and practice these techniques on your own!

From this webinar, attendees will learn:

  • Privilege escalation attack techniques on Linux
  • Defending and hardening Linux systems to break privilege escalation
ISC2 CPE Logo

CPE Credit Qualification: Many of our webinars qualify as CPE credit. Please provide your (ISC)2 ID certificate number when you register for the webinar and your CPEs will automatically be added to your (ISC)2 account within 4-6 weeks.