National CAE Designated Institution
  • Online, Instructor-Led

Learning Objectives

After completing this course, you should be able to:
Preserve artifacts found on Linux computers related to a cyber incident
Apply tools and methodologies used in host forensics
Conduct threat hunting to expose previously unknown vulnerability in a system
Analyze Linux file systems to expose threats and improve security policies
Implement a plan for hardening a Linux operating system
Plan how to securely install, patch, and update a Linux operating system

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):