top of page

Linux IR and Forensic

Pages Count

13 Pages

Links for the courses

Incident Response Linux: Challenges and Strategies : Click Me

Exploring Linux Attack Vectors                                    : Click Me

Understanding Linux Filesystems in DFIR                  : Click Me

Understanding Linux Timestamps Key Directories     : Click Me

Incident Response Log Strategy for Linux                  : Click Me

Data Collection (Key Directories) Digital Forensics    : Click Me

Linux Defenses : Key Areas Cybersecurity Success  : Click Me


Understanding Linux Service Management Systems and Persistence Mechanisms in System Compromise : Click Me

Linux File System Analysis and Linux File Recovery: EXT2/3/4 Techniques Using Debugfs, Ext4magic & Sleuth Kit : Click Me

Linux: Kernel Logs, Syslogs, Authentication Logs, and User Management : Click Me


----------------------------------------------------------------------------------------------------

Timeline Creation (Plaso/Log2Timeline)

Creating a Timeline for Linux with fls, mactime, and Plaso (Log2Timeline) : Click Me

Evidence Collection

Evidence Collection in Linux Forensics (Disk + Memory Acquisition) : Click Me

Timestomping

Timestomping in Linux: Techniques, Detection, and Forensic Insights : Click Me


--------------------------------------------------------------------------------------------------------



Your Instructor

Dean

Dean
bottom of page