MyPage is a personalized page based on your interests.The page is customized to help you to find content that matters you the most.


I'm not curious

Windows Kernel Debugging Fundamentals

Course Summary

Windows kernel debugging is one of the most hardcore skills a system administrator can possess. It provides the ability to peer into the workings of the operating system and determine why a server may have crashed or locked up. This course covers the fund


  • +

    Course Syllabus

    ● Introduction to Windows Crashes and Hangs
        ◦ Introduction
        ◦ Windows Crashes and Hangs
        ◦ Common Causes
        ◦ Memory Dump Creation
        ◦ Types of Memory Dumps
        ◦ Configuring Memory Dumps
        ◦ Dedicated Dump File
        ◦ Restrictions and Gotchas
    ● Getting Started With the Windows Debugger
        ◦ Introducing the Windows Debugger
        ◦ Live Kernel-mode Debugging
        ◦ Postmortem Analysis
        ◦ Installing the Debugging Tools
        ◦ Starting the Debugger
        ◦ Debugger Workspaces
        ◦ Opening a Memory Dump
    ● Getting Help in the Windows Debugger
        ◦ Introducing the Windows Debugger Help Library
        ◦ Finding Help on Debugger Operations
        ◦ Getting Help on Debugger Commands
        ◦ Using the Bug Checks Code Reference Section
        ◦ Processor Architectures and Instructions
    ● Configuring the Windows Debugger
        ◦ What Needs to Be Configured in WinDbg?
        ◦ Symbols
        ◦ Configuring the Symbol File Path
        ◦ Establishing the Source File Path
        ◦ Configuring the Executable Image Path
    ● Starting Your Crash Dump Analysis
        ◦ Starting Your Crash Dump Analysis With the !analyze -v Command
        ◦ Demonstration Using !analyze -v
        ◦ Strategies for Analyzing System Crashes
        ◦ Strategies for Analyzing System Hangs
    ● Understanding Stack Traces
        ◦ Stack Fundamentals
        ◦ What is a Stack Trace?
        ◦ Displaying the Stack Trace in WinDbg
        ◦ WinDbg k Command for Displaying a Stack Trace
        ◦ WinDbg dds and dqs Commands for Displaying a Stack Trace
        ◦ WinDbg !stacks Command for Displaying a Stack Trace
    ● Debugging Processes and Threads
        ◦ Windows Processes
        ◦ Using the !process Debugger Command
        ◦ Windows Threads
        ◦ Using the !thread Debugger Command
        ◦ Understanding Thread Scheduling and States
    ● Understanding Processors and Disassembled Code
        ◦ Processors and Registers
        ◦ Multiprocessor Systems
        ◦ Sockets, Cores, and Hyper-threading
        ◦ Unassembling Instruction Streams
    ● Investigating Locks and Spinlocks
        ◦ Locks and Resources
        ◦ Debugging Deadlocks
        ◦ Spinlocks
        ◦ Analyzing Spinlock Hangs
    ● Exploring Windows Virtual Memory
        ◦ What is Virtual Memory?
        ◦ Consumers of Virtual Memory
        ◦ Windows Virtual Address Space Layouts
        ◦ Windows Memory Pools
        ◦ Displaying Memory Contents
    ● Windows Drivers and Interrupts
        ◦ What is a Driver?
        ◦ I/O Request Packets (IRP)
        ◦ Interrupt Request Levels (IRQL)
        ◦ Deferred Procedure Calls (DPC)
    ● Forcing Windows Memory Dumps
        ◦ Why do Windows Servers Hang?
        ◦ Forcing a Memory Dump With NotMyFault
        ◦ Forcing a Memory Dump With a Keyboard
        ◦ Forcing a Memory Dump With a Non-maskable Interrupt

     


Course Fee:
USD 29

Course Type:

Self-Study

Course Status:

Active

Workload:

1 - 4 hours / week

This course is listed under Development & Implementations and Data & Information Management Community

Attended this course?

Back to Top

Awards & Accolades for MyTechLogy
Winner of
REDHERRING
Top 100 Asia
Finalist at SiTF Awards 2014 under the category Best Social & Community Product
Finalist at HR Vendor of the Year 2015 Awards under the category Best Learning Management System
Finalist at HR Vendor of the Year 2015 Awards under the category Best Talent Management Software
Hidden Image Url

Back to Top