Skip to main contentSkip to main content
Back to all modules

Linux Security Monitoring

Linux Security Monitoring icon

Learn how Linux logging works and how you can use it to detect common Linux attacks - all through real-world examples and challenging, hands-on threat detection labs.

This module explores the Linux attacks and defenses directly on the host, without SIEM abstractions. Through hands-on labs, you’ll uncover malware uploads, reverse shells, cryptomining activity and then trace every step back through system and process logs. This hands-on experience will sharpen your Linux skills and prepare you for real-world SOC work.

Linux Security Monitoring icon

We use cookies to ensure you get the best user experience. For more information see our cookie policy.