
Starting with fundamental principles, Investigating Linux Devices rapidly progresses to encompass log analysis, file systems, persistence mechanisms, memory forensics, live response, and more! This course offers extensive hands-on practice and a capstone involving the analysis of a compromised system. Tailored for both beginners and seasoned professionals, it serves as an ideal resource for mastering Linux forensics!
Syllabus
- Introduction to Linux
- Linux Logs
- Linux File Systems
- Persistence Mechanisms
- Evidence Collection
- Timelining
- Linux Memory Forensics
- Live Response
- Analyzing a Compromised System