Join us for Wild West Hackin’ Fest Deadwood virtual conference! Register Here

Linux Forensics with Hal Pomeranz

Course Authored by .

This 32-hour, hands-on course is a quick start into the world of Linux forensics. Learn how to use memory forensics to rapidly triage systems and spot attacker malware and rootkits.

On-Demand $1,150.00

Course Length: 32 Hours

Includes a Certificate of Completion



Next scheduled date: Content is loading, please wait.

Description

This 32-hour, hands-on course is a quick start into the world of Linux forensics. Learn how to use memory forensics to rapidly triage systems and spot attacker malware and rootkits.

Linux is everywhere– running in the cloud, on cell phones, and in embedded devices that make up the “Internet of Things”. Often neglected by their owners, vulnerable Linux systems are low-hanging fruit for attackers wishing to create powerful botnets or mine cryptocurrencies. Ransomware type attacks may target Linux-based database systems and other important infrastructure.

As attacks against Linux become more and more common, there is an increasing demand for skilled Linux investigators. However, even experienced forensics professionals may lack sufficient background to properly conduct Linux investigations. Linux is its own particular religion and requires dedicated study and practice to become comfortable.

Learn where the most critical on-disk artifacts live and how they can help further an investigation. Rapidly process Linux logs and build a clearer picture of what happened on the system.

System Requirements
  • Student Requirements
    • High-speed Internet access
    • A BitTorrent client for downloading course materials (e.g., Transmission https://transmissionbt.com/download/)
    • At least 150GB of free space and capable of running a 64-bit VMware virtual machine using 4GB of RAM

FAQ

Key Takeaways
• Acquiring and analyzing Linux memory
• Accessing complex Linux disk geometries
• Rapid triage for key Linux artifacts
• Linux log analysis
Who Should Take This Course
• Experienced forensic professionals wanting to expand their Linux knowledge
• SOC analysts needing a stronger grounding in Linux
• Administrators/developers defending Linux infrastructures
Audience Skill Level
This course is an introduction to Linux forensics, but not an introduction to forensics. The course assumes at least some knowledge of digital forensic methods, such as evidence acquisition. This course is heavily command-line driven, so basic familiarity with the Linux command-line is helpful.
What Each Student Should Bring
A properly configured computer (see "System Requirements") and natural curiosity!

About the Instructor

Pixel splash background
Hal Pomeranz
Hal Pomeranz
"Computer Forensics and Information Security, often with a spicy Linux flavor. Expert Witness. Trainer."
Bio

Hal Pomeranz is an independent digital forensic investigator who has consulted on cases ranging from intellectual property theft, to employee sabotage, to organized cybercrime and malicious software infrastructures. He has spent more than thirty years providing pragmatic Information Technology and Security solutions for some of the world’s largest commercial, government, and academic institutions.

On-Demand

Antisyphon's On-Demand classes give you flexible, self-paced access to the same high-quality training our live events are known for. Whether you're diving into forensics, cloud security, or offensive tooling, each course includes:

  • Full access to video recordings, slides, and downloadable resources
  • Hands-on labs and virtual machines to reinforce real-world skills
  • Cyber Range access for immersive practice (select courses)
  • Dedicated Discord support from instructors and peers
  • Certificates of participation upon completion

Start learning when it works for you!
No deadlines, no pressure. Just real, practical cybersecurity training on your schedule.

Purchase:
Content is loading, please wait.
Shopping Cart

No products in the cart.