25.8.0
This website uses cookies to ensure you get the best experience on our website. Learn more

Linux Forensics

James Tan Wee Jing

Linux is everywhere-- running in the cloud, on cell phones, and in embedded devices that make up the "Internet of Things". Often neglected by their owners, vulnerable Linux systems are low-hanging fruit for attackers wishing to create powerful botnets or mine cryptocurrencies. Ransomware attacks target Linux-based database systems and other important infrastructure. As attacks against Linux become more and more common, there is an increasing demand for skilled Linux investigators. But even experienced forensics professionals may lack sufficient background to properly conduct Linux investigations. Linux is its own particular religion and requires dedicated study and practice to become comfortable. This four-day, hands-on course is a quick start into the world of Linux forensics. Learn how to rapidly triage systems and spot attacker malware and rootkits. Learn where the most critical on-disk artifacts live and how they can help further an investigation. Rapidly process Linux logs and build a clearer picture of what happened on the system. Look at the internals of common Linux file systems and learn how to recover deleted data.

Skills / Knowledge

  • Forensics

Issued on

April 19, 2024

Expires on

Does not expire