Register Account


Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Linux Forensics In Depth
#1
[Image: ebbe932e9c8f12ae11ef28e7683a303e.jpg]
Linux Forensics In Depth
Published 12/2024
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 712.97 MB | Duration: 2h 7m

Uncover Clues, Analyze Attacks and Master Linux Investigations.

What you'll learn

Understand the basics of Linux forensics and why it's important for security investigations.

Learn how to collect evidence from a live Linux system.

Explore techniques for analyzing system logs and identifying suspicious activities.

Gain hands-on experience in recovering deleted files and understanding file system behavior.

Requirements

No prior experience in forensics is needed. Basic knowledge of Linux commands and concepts is recommended but not required.

Description

Uncover the secrets hiding in Linux systems. Whether you're tracking cyber intrusions, investigating insider threats, or simply expanding your forensic skills, this course equips you with the tools and techniques to analyze Linux environments like a pro.In Linux Forensics In-Depth, you'll learn how to:Investigate running processes to identify suspicious activity.Monitor network connections and trace malicious communications.Detect and analyze persistence mechanisms like hidden users, cronjobs, and services.Explore user traces, software artifacts, system logs, and bash history for critical evidence.This course is packed with hands-on demonstrations and real-world scenarios, ensuring you gain practical skills that can be applied immediately. No fluff, no filler-just the essential knowledge you need to investigate and uncover the truth in Linux systems.Who Is This Course For?Cybersecurity professionals and students looking to expand their forensic capabilities and gain an edge in the field.IT admins and system analysts aiming to strengthen their understanding of Linux incident investigations and system security.Beginners and enthusiasts curious about digital forensics who want to start their journey with a focused and practical approach.Linux powers the world's infrastructure, and understanding how to investigate and secure these systems is a critical skill in today's cybersecurity landscape.

Overview

Section 1: Introduction

Lecture 1 Introduction

Section 2: Linux Forensics

Lecture 2 OS info

Lecture 3 System info

Lecture 4 Persistance

Lecture 5 Traces of Malware

Lecture 6 Logs in Depth

Section 3: Processes

Lecture 7 Understanding Processes

Lecture 8 Cronjobs

Lecture 9 Services

Lecture 10 Autostart

Lecture 11 App history

Section 4: Core Investigation Areas

Lecture 12 Processes

Lecture 13 Network Activity

Lecture 14 Persistance: Users

Lecture 15 Persistance: Cronjobs

Lecture 16 Persistance: Services

Lecture 17 Traces: User Info

Lecture 18 Traces: Software

Lecture 19 Traces: Logs

Lecture 20 Traces: Command History

Section 5: OSQuery

Lecture 21 Installing OSQueryi

Lecture 22 OSQueryi

Lecture 23 Processes

Lecture 24 Network

Lecture 25 Files

Lecture 26 Persistance

Lecture 27 Command Overview

Beginners in Linux forensics,IT professionals wanting to learn forensics on Linux,Anyone interested in basic cybersecurity and Linux system analysis

[Image: FX470bze_o.jpg]

[To see links please register or login]

[To see links please register or login]

[To see links please register or login]

[Image: signature.png]
Reply



Forum Jump:


Users browsing this thread:
1 Guest(s)

Download Now   Download Now
Download Now   Download Now