• Online, Instructor-Led
  • Online, Self-Paced
Course Description

Malware often seeks to use the auto-start mechanism on a machine to persist, reloading at system startup or pre-defined schedules. On Linux, this mechanism is known as the cronjob scheduling facility and is often used by attackers to ensure they maintain their connection to the infected server or machine. Learn to use your crontab on a Linux machine and advance your abilities to detect persistence in Linux.

Learning Objectives

Learn to use your crontab on a Linux machine and advance your abilities to detect persistence in Linux.

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Cyber Defense Analysis
  • Cyber Defense Infrastructure Support
  • Cyber Investigation

Specialty Areas have been removed from the NICE Framework. With the recent release of the new NICE Framework data, updates to courses are underway. Until this course can be updated, this historical information is provided to give better context as to how it can help you with your cybersecurity goals.