» » Pluralsight Windows Kernel Debugging Fundamentals

Information of news
  • Author: BaDshaH
  • Date: 8-08-2015, 09:13
8-08-2015, 09:13

Pluralsight Windows Kernel Debugging Fundamentals

Category: Tutorials

"Windows developers and IT admins learn valuable skills on debugging the Windows Blue Screen of Death (BSOD). Learn how to use the Windows Debugger (WinDbg), along with knowledge of the internal workings of the Windows operating system as you analyze crashes and hangs."

Windows kernel debugging is one of the most hardcore skills a system administrator can possess. It provides the ability to peer into the workings of the operating system and determine why a server may have crashed or locked up. This course covers the fundamentals essential for understanding the internal workings of the Windows operating system and how to install and use the Windows Debugger. Strategies are provided for examining crashes that give learners immediate confidence with analyzing crashes and hangs. You will learn about Windows processes and threads, stack traces, processors, synchronization mechanisms, address space layout, drivers and interrupts and much more. You will leave this course with the troubleshooting skills that you can leverage for many years to come.

Duration: 5h 2m[/i]

Introduction to Windows Crashes and Hangs
Windows Crashes and Hangs
Common Causes
Memory Dump Creation
Types of Memory Dumps
Configuring Memory Dumps
Dedicated Dump File
Restrictions and Gotchas

Getting Started With the Windows Debugger
Introducing the Windows Debugger
Live Kernel-mode Debugging
Postmortem Analysis
Installing the Debugging Tools
Starting the Debugger
Debugger Workspaces
Opening a Memory Dump

Getting Help in the Windows Debugger
Introducing the Windows Debugger Help Library
Finding Help on Debugger Operations
Getting Help on Debugger Commands
Using the Bug Checks Code Reference Section
Processor Architectures and Instructions

Configuring the Windows Debugger
What Needs to Be Configured in WinDbg?
Configuring the Symbol File Path
Establishing the Source File Path
Configuring the Executable Image Path

Starting Your Crash Dump Analysis
Starting Your Crash Dump Analysis With the !analyze -v Command
Demonstration Using !analyze -v
Strategies for Analyzing System Crashes
Strategies for Analyzing System Hangs

Understanding Stack Traces
Stack Fundamentals
What is a Stack Trace?
Displaying the Stack Trace in WinDbg
WinDbg k Command for Displaying a Stack Trace
WinDbg dds and dqs Commands for Displaying a Stack Trace
WinDbg !stacks Command for Displaying a Stack Trace

Debugging Processes and Threads
Windows Processes
Using the !process Debugger Command
Windows Threads
Using the !thread Debugger Command
Understanding Thread Scheduling and States

Understanding Processors and Disassembled Code
Processors and Registers
Multiprocessor Systems
Sockets, Cores, and Hyper-threading
Unassembling Instruction Streams

Investigating Locks and Spinlocks
Locks and Resources
Debugging Deadlocks
Analyzing Spinlock Hangs

Exploring Windows Virtual Memory
What is Virtual Memory?
Consumers of Virtual Memory
Windows Virtual Address Space Layouts
Windows Memory Pools
Displaying Memory Contents

Windows Drivers and Interrupts
What is a Driver?
I/O Request Packets (IRP)
Interrupt Request Levels (IRQL)
Deferred Procedure Calls (DPC)

Forcing Windows Memory Dumps
Why do Windows Servers Hang?
Forcing a Memory Dump With NotMyFault
Forcing a Memory Dump With a Keyboard
Forcing a Memory Dump With a Non-maskable Interrupt

I recommends Buy premimum account for High speed+parallel downloads!





Site BBcode/HTML Code:
Dear visitor, you went to the site as unregistered user.
We recommend you Sign up or Login to website under your name.
Would you like to leave your comment? Please Login to your account to leave comments. Don't have an account? You can create a free account now.

Tag Cloud

archive of news

free html hit counter