Antisyphon – Linux Forensics w/ Hal Pomeranz
English | Tutorial | Size: 4.53 GB
Linux is everywhere- running in the cloud, on cell phones, and in embedded devices that make up the “Internet of Things”. Often neglected by their owners, vulnerable Linux systems are low-hanging fruit for attackers wishing to create powerful botnets or mine cryptocurrencies. Ransomware type attacks may target Linux-based database systems and other important infrastructure.
As attacks against Linux become more and more common, there is an increasing demand for skilled Linux investigators. But even experienced forensics professionals may lack sufficient background to properly conduct Linux investigations. Linux is its own particular religion and requires dedicated study and practice to become comfortable.
This 32-hour, hands-on course is a quick start into the world of Linux forensics. Learn how to use memory forensics to rapidly triage systems and spot attacker malware and rootkits. Learn where the most critical on-disk artifacts live and how they can help further an investigation. Rapidly process Linux logs and build a clearer picture of what happened on the system.
Key Takeaways
Acquiring and analyzing Linux memory
Accessing complex Linux disk geometries
Rapid triage for key Linux artifacts
Linux log analysis
Who Should Take This Course
Experienced forensic professionals wanting to expand their Linux knowledge
SOC analysts needing a stronger grounding in Linux
Administrators/developers defending Linux infrastructures
Audience Skill Level
This course is an introduction to Linux forensics, but not an introduction to forensics. The course assumes at least some knowledge of digital forensic methods, such as evidence acquisition. This course is heavily command-line driven, so basic familiarity with the Linux command-line is helpful.
Student Requirements
High-speed Internet access
A BitTorrent client for downloading course materials (e.g., Transmission)
A computer with at least 150GB of free space and capable of running a 64-bit VMware virtual machine using 4GB of RAM
RAPIDGATOR:
rapidgator.net/file/90951f223f8925467aa276a8a3d76523/Antisyphon_-_Linux_Forensics_w_Hal_Pomeranz.part1.rar.html
rapidgator.net/file/fac371a63f5371a5040496888ffc6a3f/Antisyphon_-_Linux_Forensics_w_Hal_Pomeranz.part2.rar.html
rapidgator.net/file/2b1088835d7e3e94924962aa356431f7/Antisyphon_-_Linux_Forensics_w_Hal_Pomeranz.part3.rar.html
rapidgator.net/file/97b28bbe20b391e8249a069952b17a04/Antisyphon_-_Linux_Forensics_w_Hal_Pomeranz.part4.rar.html
rapidgator.net/file/17d2a46a42e71a708fecc476bb938806/Antisyphon_-_Linux_Forensics_w_Hal_Pomeranz.part5.rar.html
rapidgator.net/file/63d0a0388a0154ce1a6dd295ef36a668/Antisyphon_-_Linux_Forensics_w_Hal_Pomeranz.part6.rar.html
rapidgator.net/file/78536cad426f19a901dfeb5f3bc69676/Antisyphon_-_Linux_Forensics_w_Hal_Pomeranz.part7.rar.html
TURBOBIT:
turbobit.net/z6z9pe8pw0tu/Antisyphon%20-%20Linux%20Forensics%20w%20Hal%20Pomeranz.part1.rar.html
turbobit.net/0ucpvgthzb9r/Antisyphon%20-%20Linux%20Forensics%20w%20Hal%20Pomeranz.part2.rar.html
turbobit.net/ov2cp1v6gx7j/Antisyphon%20-%20Linux%20Forensics%20w%20Hal%20Pomeranz.part3.rar.html
turbobit.net/5vh88bs5q9mx/Antisyphon%20-%20Linux%20Forensics%20w%20Hal%20Pomeranz.part4.rar.html
turbobit.net/5kk2vm6k1en7/Antisyphon%20-%20Linux%20Forensics%20w%20Hal%20Pomeranz.part5.rar.html
turbobit.net/c1gn05pc1hi8/Antisyphon%20-%20Linux%20Forensics%20w%20Hal%20Pomeranz.part6.rar.html
turbobit.net/rt5io4rpyrxd/Antisyphon%20-%20Linux%20Forensics%20w%20Hal%20Pomeranz.part7.rar.html