Online Training: Advanced Linux Core Dump Analysis with Data Structures, Machine Learning, and AI

Software Diagnostics Services organizes this online training course.

March 23, 30, April 6, 13, 20, 27 12:30 pm - 1:30 pm (GMT+1, March 23 GMT) Price 99 USD Registration for 6 one-hour sessions

Learn how to navigate the process and kernel core memory dump space, and use Linux data structures to diagnose, troubleshoot, and debug complex software incidents. The training uses a unique, innovative pattern-oriented analysis approach to accelerate learning. It consists of practical step-by-step exercises using GDB and the Linux kernel crash utility. Additional topics include kernel structures navigation, practical scripting, kernel modules, device drivers, I/O, file systems, and security. The training builds on the bestselling Accelerated Linux Core Dump Analysis and includes a crash course in essential C for the Linux kernel and a relevant Unified Modeling Language tutorial. The course also covers machine learning and AI to aid and automate core dump analysis.

To avoid repeating some topics and save time, the training offer includes the Accelerated Linux Core Dump Analysis book, along with required x64 and ARM64 review. This offer is only valid for March 2026 training sessions.

Before the training, you get:

After the training, you also get:

  • The PDF book version of the training: Advanced Linux Core Dump Analysis with Data Structures
  • Personalized Certificate of Attendance with unique CID
  • Answers to questions during training sessions
  • Recording

Prerequisites:

Basic and intermediate level Linux core dump analysis: the ability to list tasks, threads, libraries, modules, apply symbols, walk through backtraces and raw stack data, diagnose patterns such as heap corruption, CPU spike, memory leaks, segmentation faults, wait chains, and deadlocks. If you are not comfortable with the prerequisites, Accelerated Linux Core Dump Analysis training or the corresponding book is recommended before attending this training.

Audience:

Software technical support and escalation engineers, cloud engineers, DevOps and DevSecOps, system administrators, security researchers, reverse engineers, malware and memory forensics analysts, software developers, and quality assurance engineers.