Room progress ( 0% )
Task 1Introduction
Task 2Scenario Information
Task 3Lab Connection
Task includes a deployable machine
Task 4Memory Overview: Linux vs Windows
Task 5Hunting for Suspicious Process
Task 6Hunting for Suspicious Network Activities
Task 7Hunting for User Activities
Task 8Conclusion
Ready to learn Cyber Security? Create your free account today!
The Linux Memory Analysis room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.
Already have an account? Log in