Starting with fundamental principles, Investigating Linux Devices rapidly progresses to encompass log analysis, file systems, persistence mechanisms, memory forensics, live response, and more! This course offers extensive hands-on practice and a capstone involving the analysis of a compromised system. Tailored for both beginners and seasoned professionals, it serves as an ideal resource for mastering Linux forensics!
Syllabus
Introduction to Linux
Linux Logs
Linux File Systems
Persistence Mechanisms
Evidence Collection
Timelining
Linux Memory Forensics
Live Response
Analyzing a Compromised System
To see this hidden content, you need to
"Reply & React" with one of the following reactions:
Like