Room progress ( 0% )
Task 1Introduction
Task includes a deployable machine
Task 2Logging Levels and Kernel Logs
Task 3Exploring the /var/log Directory
Task 4User Logging With Syslog
Task 5Journalctl
Task 6Leveraging Auditd for Security
Task 7Examining Auth Logs
Task 8Analysing Application Logs
Task 9Linux Logs Capstone
Task 10Conclusion
Created by
Room Type
Only subscribers can deploy virtual machines in this room! Go to your profile page to subscribe (if you have not already).
Users in Room
3,417
Created
402 days ago
Ready to learn Cyber Security? Create your free account today!
The Linux Logs Investigations room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.
Already have an account? Log in