SEC0 is here - get certified to start your cyber journey.

The best entry point to cyber for those without a technical background. Take SEC0 and prove you've got what it takes.

Pre Security CertificationPre Security Certification
Back to all modules

Linux Security Monitoring

Linux Security Monitoring icon

Learn how Linux logging works and how you can use it to detect common Linux attacks - all through real-world examples and challenging, hands-on threat detection labs.

This module explores the Linux attacks and defenses directly on the host, without SIEM abstractions. Through hands-on labs, you’ll uncover malware uploads, reverse shells, cryptomining activity and then trace every step back through system and process logs. This hands-on experience will sharpen your Linux skills and prepare you for real-world SOC work.

Linux Security Monitoring icon

We use cookies to ensure you get the best user experience. For more information see our cookie policy.