30% OFF ANNUAL SUBSCRIPTIONS - our love language this Valentine's

03days
:
04hr
:
29min
:
57sec
Back to all modules

Linux Security Monitoring

Linux Security Monitoring icon

Learn how Linux logging works and how you can use it to detect common Linux attacks - all through real-world examples and challenging, hands-on threat detection labs.

This module explores the Linux attacks and defenses directly on the host, without SIEM abstractions. Through hands-on labs, you’ll uncover malware uploads, reverse shells, cryptomining activity and then trace every step back through system and process logs. This hands-on experience will sharpen your Linux skills and prepare you for real-world SOC work.

Linux Security Monitoring icon

We use cookies to ensure you get the best user experience. For more information see our cookie policy.