Featured resource
2026 Tech Forecast
2026 Tech Forecast

Stay ahead of what’s next in tech with predictions from 1,500+ business leaders, insiders, and Pluralsight Authors.

Get these insights
  • Course

Privilege Escalation for Offensive Security Professionals

This course will teach you critical techniques to identify and exploit privilege escalation vulnerabilities on Linux and Windows, helping you sharpen your skills for real-world scenarios.

Advanced
1h 38m
(3)

Created by Rishalin Pillay

Last Updated Feb 04, 2025

Course Thumbnail
  • Course

Privilege Escalation for Offensive Security Professionals

This course will teach you critical techniques to identify and exploit privilege escalation vulnerabilities on Linux and Windows, helping you sharpen your skills for real-world scenarios.

Advanced
1h 38m
(3)

Created by Rishalin Pillay

Last Updated Feb 04, 2025

Get started today

Access this course and other top-rated tech content with one of our business plans.

Try this course for free

Access this course and other top-rated tech content with one of our individual plans.

This course is included in the libraries shown below:

  • Security
What you'll learn

Are you looking to advance your privilege escalation skills? In this course, Privilege Escalation for Offensive Security Professionals, you’ll learn various privilege escalation techniques. First, you’ll explore Windows privilege escalation. Next, you’ll discover Linux privilege escalation. Finally, you’ll learn how to leverage kernel privilege escalation. When you’re finished with this course, you’ll have the skills and knowledge of privilege escalation needed to enhance your skillset.

Privilege Escalation for Offensive Security Professionals
Advanced
1h 38m
(3)
Table of contents

About the author
Rishalin Pillay - Pluralsight course - Privilege Escalation for Offensive Security Professionals
Rishalin Pillay
23 courses 4.5 author rating 149 ratings

Rishalin Pillay has over 12 years of cybersecurity experience and has acquired a vast amount of skills consulting for Fortune 500 companies while taking part in projects performing tasks in network security design, implementation, and vulnerability analysis. He holds many certifications that demonstrate his knowledge and expertise in the cybersecurity field. He is an author and content contributor to a number of books.

Get started with Pluralsight