Linux Forensics In Depth - Printable Version +- Softwarez.Info - Software's World! (https://softwarez.info) +-- Forum: Library Zone (https://softwarez.info/Forum-Library-Zone) +--- Forum: Video Tutorials (https://softwarez.info/Forum-Video-Tutorials) +--- Thread: Linux Forensics In Depth (/Thread-Linux-Forensics-In-Depth) |
Linux Forensics In Depth - AD-TEAM - 12-16-2024 Linux Forensics In Depth Published 12/2024 MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz Language: English | Size: 712.97 MB | Duration: 2h 7m Uncover Clues, Analyze Attacks and Master Linux Investigations. What you'll learn Understand the basics of Linux forensics and why it's important for security investigations. Learn how to collect evidence from a live Linux system. Explore techniques for analyzing system logs and identifying suspicious activities. Gain hands-on experience in recovering deleted files and understanding file system behavior. Requirements No prior experience in forensics is needed. Basic knowledge of Linux commands and concepts is recommended but not required. Description Uncover the secrets hiding in Linux systems. Whether you're tracking cyber intrusions, investigating insider threats, or simply expanding your forensic skills, this course equips you with the tools and techniques to analyze Linux environments like a pro.In Linux Forensics In-Depth, you'll learn how to:Investigate running processes to identify suspicious activity.Monitor network connections and trace malicious communications.Detect and analyze persistence mechanisms like hidden users, cronjobs, and services.Explore user traces, software artifacts, system logs, and bash history for critical evidence.This course is packed with hands-on demonstrations and real-world scenarios, ensuring you gain practical skills that can be applied immediately. No fluff, no filler-just the essential knowledge you need to investigate and uncover the truth in Linux systems.Who Is This Course For?Cybersecurity professionals and students looking to expand their forensic capabilities and gain an edge in the field.IT admins and system analysts aiming to strengthen their understanding of Linux incident investigations and system security.Beginners and enthusiasts curious about digital forensics who want to start their journey with a focused and practical approach.Linux powers the world's infrastructure, and understanding how to investigate and secure these systems is a critical skill in today's cybersecurity landscape. Overview Section 1: Introduction Lecture 1 Introduction Section 2: Linux Forensics Lecture 2 OS info Lecture 3 System info Lecture 4 Persistance Lecture 5 Traces of Malware Lecture 6 Logs in Depth Section 3: Processes Lecture 7 Understanding Processes Lecture 8 Cronjobs Lecture 9 Services Lecture 10 Autostart Lecture 11 App history Section 4: Core Investigation Areas Lecture 12 Processes Lecture 13 Network Activity Lecture 14 Persistance: Users Lecture 15 Persistance: Cronjobs Lecture 16 Persistance: Services Lecture 17 Traces: User Info Lecture 18 Traces: Software Lecture 19 Traces: Logs Lecture 20 Traces: Command History Section 5: OSQuery Lecture 21 Installing OSQueryi Lecture 22 OSQueryi Lecture 23 Processes Lecture 24 Network Lecture 25 Files Lecture 26 Persistance Lecture 27 Command Overview Beginners in Linux forensics,IT professionals wanting to learn forensics on Linux,Anyone interested in basic cybersecurity and Linux system analysis |