
Please access this website using a laptop / desktop or tablet for the best experience

Linux IR and Forensic
Pages Count
13 Pages
Links for the courses
Incident Response Linux: Challenges and Strategies : Click Me
Exploring Linux Attack Vectors                   : Click Me
Understanding Linux Filesystems in DFIR Â Â Â Â Â Â Â Â Â : Click Me
Understanding Linux Timestamps Key Directories   : Click Me
Incident Response Log Strategy for Linux          : Click Me
Data Collection (Key Directories) Digital Forensics   : Click Me
Linux Defenses : Key Areas Cybersecurity Success : Click Me
Understanding Linux Service Management Systems and Persistence Mechanisms in System Compromise : Click Me
Linux File System Analysis and Linux File Recovery: EXT2/3/4 Techniques Using Debugfs, Ext4magic & Sleuth Kit : Click Me
Linux: Kernel Logs, Syslogs, Authentication Logs, and User Management : Click Me
----------------------------------------------------------------------------------------------------
Timeline Creation (Plaso/Log2Timeline)
Creating a Timeline for Linux with fls, mactime, and Plaso (Log2Timeline) : Click Me
Evidence Collection
Evidence Collection in Linux Forensics (Disk + Memory Acquisition) : Click Me
Timestomping
Timestomping in Linux: Techniques, Detection, and Forensic Insights : Click Me
--------------------------------------------------------------------------------------------------------
Your Instructor
Dean
