Advent of Cyber 2025

Daily festive challenges and 30% off annual subscriptions

28days
:
10hr
:
25min
:
38sec
Subscribe now
Back to all modules

Linux Security Monitoring

Linux Security Monitoring icon

Learn how Linux logging works and how you can use it to detect common Linux attacks - all through real-world examples and challenging, hands-on threat detection labs.

This module explores the Linux attacks and defenses directly on the host, without SIEM abstractions. Through hands-on labs, you’ll uncover malware uploads, reverse shells, cryptomining activity and then trace every step back through system and process logs. This hands-on experience will sharpen your Linux skills and prepare you for real-world SOC work.

Linux Security Monitoring icon

We use cookies to ensure you get the best user experience. For more information contact us.

Read more