Lesson 11
Learn how to analyze a Linux system after a compromise — reconstruct the timeline, identify abnormal processes and connections, detect traces on disk, and uncover typical persistence mechanisms.
Locked lesson
This lesson is reserved for members. Upgrade to unlock the full course.
200+ lessons • Challenges • Flashcards • $9/month
12 lessons locked in this course · 800+ students enrolled
$99/year — save 31% vs monthly