Linux Endpoint Investigation
Unravel the mysteries of Linux forensics with a deep dive into live analysis, process scrutiny, and log investigations.
Linux, the backbone of countless servers and supercomputers, is a prime target for malicious actors. To effectively counter threats, understanding the intricacies of Linux forensics is vital. This module equips you with the skills to perform live analysis, dissect processes and applications for persistence methods, and explore system logs for incident response. By mastering these techniques, you'll become a formidable defender of Linux systems.
0%
Linux Incident Surface
Explore various areas of Incident Surface in Linux and how to identify the footprints of the incident.
0%
Linux Process Analysis
Perform thorough process and application analysis to identify an attacker's persistence methods.
0%
Linux Logs Investigations
Explore Linux system logs for effective incident response.
0%
Linux Live Analysis
Learn how to perform live forensics on a Linux host.
0%
IronShade
Perform a compromise assessment on a Linux host and identify the attack footprints.
What are modules?
A learning pathway is made up of modules, and a module is made of bite-sized rooms (think of a room like a mini security lab).
