Understand the basics of Linux forensics and why it’s important for security investigations.
Learn how to collect evidence from a live Linux system.
Explore techniques for analyzing system logs and identifying suspicious activities.
Gain hands-on experience in recovering deleted files and understanding file system behavior.
About Course
Introduction
Persistance
Traces of Malware
Logs in Depth
Quiz
Understanding Processes
Cronjobs
Services
Autostart
App history
Quiz
Processes
Network Activity
Persistance: Users
Persistance: Cronjobs
Persistance: Services
Traces: User Info
Traces: Software
Traces: Logs
Traces: Command History
Quiz
Description
Uncover the secrets hiding in Linux systems. Whether you’re tracking cyber intrusions, investigating insider threats, or simply expanding your forensic skills, this course equips you with the tools and techniques to analyze Linux environments like a pro.
In Linux Forensics In-Depth, you’ll learn how to:
Investigate running processes to identify suspicious activity.
Monitor network connections and trace malicious communications.
Detect and analyze persistence mechanisms like hidden users, cronjobs, and services.
Explore user traces, software artifacts, system logs, and bash history for critical evidence.
This course is packed with hands-on demonstrations and real-world scenarios, ensuring you gain practical skills that can be applied immediately. No fluff, no filler—just the essential knowledge you need to investigate and uncover the truth in Linux systems.
This Course is for:
Beginners in Linux forensics
IT professionals wanting to learn forensics on Linux
Anyone interested in basic cybersecurity and Linux system analysis
One thought on “Linux Forensics in Depth In 2024 (Free Course)”