System and File Analysis with Bash
Offered By: Pluralsight
Course Description
Overview
Welcome to System and File Analysis with Bash. This
course will teach you how to use Bash scripts to collect
system information, such as log files, registry keys,
and how to perform file and data analysis during a
cybersecurity incident response.
Responding to cybersecurity incidents is a challenging task. In this day and age a proper response can make all the difference between losing millions and even billions of dollars and steering the enterprise back on the right track to profitable business operations. In this course, System and File Analysis with Bash, you’ll learn to write and leverage Bash scripts in the context of a cybersecurity incident response. First, you’ll explore gathering and collecting system information with Bash scripts. Next, you’ll discover how to perform file and data analysis based on the information you have gathered. Finally, you’ll learn how to prioritize the decisive actions you need to take to prevent or mitigate a breach and communicate effectively to achieve this goal. When you’re finished with this course, you’ll have the skills and knowledge to obtain the information needed to respond effectively to a cybersecurity incident in a timely manner.
course will teach you how to use Bash scripts to collect
system information, such as log files, registry keys,
and how to perform file and data analysis during a
cybersecurity incident response.
Responding to cybersecurity incidents is a challenging task. In this day and age a proper response can make all the difference between losing millions and even billions of dollars and steering the enterprise back on the right track to profitable business operations. In this course, System and File Analysis with Bash, you’ll learn to write and leverage Bash scripts in the context of a cybersecurity incident response. First, you’ll explore gathering and collecting system information with Bash scripts. Next, you’ll discover how to perform file and data analysis based on the information you have gathered. Finally, you’ll learn how to prioritize the decisive actions you need to take to prevent or mitigate a breach and communicate effectively to achieve this goal. When you’re finished with this course, you’ll have the skills and knowledge to obtain the information needed to respond effectively to a cybersecurity incident in a timely manner.
Syllabus
- Course Overview 1min
- Incident Response (IR) 7mins
- Data Collection 46mins
- File Analysis 35mins
- Data Analysis 16mins
Taught by
George Smith
Related Courses
File Analysis with TruffleHogPluralsight Beyond AV - Detection-Oriented File Analysis
Security BSides San Francisco via YouTube Open Source Malware Lab
Security BSides London via YouTube Incident Response with Fireeye - Final Hackersploit Blue Team Training
Linode via YouTube Offensive Anti-Analysis
Security BSides London via YouTube