top of page
![](https://static.wixstatic.com/media/11062b_61151d0087ad418fa801687a88c78716~mv2.jpg/v1/fill/w_1920,h_1323,al_c,q_90,usm_0.66_1.00_0.01,enc_avif,quality_auto/11062b_61151d0087ad418fa801687a88c78716~mv2.jpg)
![](https://static.wixstatic.com/media/5fb032_d27790b3aa494835bf75cad599588faf~mv2.jpg/v1/fill/w_980,h_980,al_c,q_85,usm_0.66_1.00_0.01,enc_auto/5fb032_d27790b3aa494835bf75cad599588faf~mv2.jpg)
Linux IR and Forensic
Pages Count
7 Pages
Links for the courses
Incident Response Linux: Challenges and Strategies : Click Me
Exploring Linux Attack Vectors                   : Click Me
Understanding Linux Filesystems in DFIR Â Â Â Â Â Â Â Â Â : Click Me
Understanding Linux Timestamps Key Directories   : Click Me
Incident Response Log Strategy for Linux          : Click Me
Data Collection (Key Directories) Digital Forensics   : Click Me
Linux Defenses : Key Areas Cybersecurity Success : Click Me
Your Instructor
Dean
![Dean](https://static.wixstatic.com/media/5fb032_3db91b1fff95466183c4e25d0c5a3d22~mv2.jpg/v1/fill/w_110,h_153,al_c,q_80,usm_0.66_1.00_0.01,enc_avif,quality_auto/Image-empty-state.jpg)
bottom of page