- James Tan Wee JingHal PomeranzLinux Forensics (Virtual)Cody NelsonApril 16 - 19, 32 Credit Hours

James Tan Wee Jing
Hal Pomeranz
Linux Forensics (Virtual)
Cody Nelson
April 16 - 19, 32 Credit Hours
James Tan Wee Jing
Linux is everywhere-- running in the cloud, on cell phones, and in embedded devices that make up the "Internet of Things". Often neglected by their owners, vulnerable Linux systems are low-hanging fruit for attackers wishing to create powerful botnets or mine cryptocurrencies. Ransomware attacks target Linux-based database systems and other important infrastructure.
As attacks against Linux become more and more common, there is an increasing demand for skilled Linux investigators. But even experienced forensics professionals may lack sufficient background to properly conduct Linux investigations. Linux is its own particular religion and requires dedicated study and practice to become comfortable.
This four-day, hands-on course is a quick start into the world of Linux forensics. Learn how to rapidly triage systems and spot attacker malware and rootkits. Learn where the most critical on-disk artifacts live and how they can help further an investigation. Rapidly process Linux logs and build a clearer picture of what happened on the system. Look at the internals of common Linux file systems and learn how to recover deleted data.
Skills / Knowledge
- Forensics
Issued on
April 19, 2024
Expires on
Does not expire