12-16-2024, 06:42 PM
Linux Forensics In Depth
Published 12/2024
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 712.97 MB | Duration: 2h 7m
Uncover Clues, Analyze Attacks and Master Linux Investigations.
What you'll learn
Understand the basics of Linux forensics and why it's important for security investigations.
Learn how to collect evidence from a live Linux system.
Explore techniques for analyzing system logs and identifying suspicious activities.
Gain hands-on experience in recovering deleted files and understanding file system behavior.
Requirements
No prior experience in forensics is needed. Basic knowledge of Linux commands and concepts is recommended but not required.
Description
Uncover the secrets hiding in Linux systems. Whether you're tracking cyber intrusions, investigating insider threats, or simply expanding your forensic skills, this course equips you with the tools and techniques to analyze Linux environments like a pro.In Linux Forensics In-Depth, you'll learn how to:Investigate running processes to identify suspicious activity.Monitor network connections and trace malicious communications.Detect and analyze persistence mechanisms like hidden users, cronjobs, and services.Explore user traces, software artifacts, system logs, and bash history for critical evidence.This course is packed with hands-on demonstrations and real-world scenarios, ensuring you gain practical skills that can be applied immediately. No fluff, no filler-just the essential knowledge you need to investigate and uncover the truth in Linux systems.Who Is This Course For?Cybersecurity professionals and students looking to expand their forensic capabilities and gain an edge in the field.IT admins and system analysts aiming to strengthen their understanding of Linux incident investigations and system security.Beginners and enthusiasts curious about digital forensics who want to start their journey with a focused and practical approach.Linux powers the world's infrastructure, and understanding how to investigate and secure these systems is a critical skill in today's cybersecurity landscape.
Overview
Section 1: Introduction
Lecture 1 Introduction
Section 2: Linux Forensics
Lecture 2 OS info
Lecture 3 System info
Lecture 4 Persistance
Lecture 5 Traces of Malware
Lecture 6 Logs in Depth
Section 3: Processes
Lecture 7 Understanding Processes
Lecture 8 Cronjobs
Lecture 9 Services
Lecture 10 Autostart
Lecture 11 App history
Section 4: Core Investigation Areas
Lecture 12 Processes
Lecture 13 Network Activity
Lecture 14 Persistance: Users
Lecture 15 Persistance: Cronjobs
Lecture 16 Persistance: Services
Lecture 17 Traces: User Info
Lecture 18 Traces: Software
Lecture 19 Traces: Logs
Lecture 20 Traces: Command History
Section 5: OSQuery
Lecture 21 Installing OSQueryi
Lecture 22 OSQueryi
Lecture 23 Processes
Lecture 24 Network
Lecture 25 Files
Lecture 26 Persistance
Lecture 27 Command Overview
Beginners in Linux forensics,IT professionals wanting to learn forensics on Linux,Anyone interested in basic cybersecurity and Linux system analysis