System and File Analysis with Bash
Offered By: Pluralsight
Course Description
Overview
Welcome to System and File Analysis with Bash. This
course will teach you how to use Bash scripts to collect
system information, such as log files, registry keys,
and how to perform file and data analysis during a
cybersecurity incident response.
Responding to cybersecurity incidents is a challenging task. In this day and age a proper response can make all the difference between losing millions and even billions of dollars and steering the enterprise back on the right track to profitable business operations. In this course, System and File Analysis with Bash, you’ll learn to write and leverage Bash scripts in the context of a cybersecurity incident response. First, you’ll explore gathering and collecting system information with Bash scripts. Next, you’ll discover how to perform file and data analysis based on the information you have gathered. Finally, you’ll learn how to prioritize the decisive actions you need to take to prevent or mitigate a breach and communicate effectively to achieve this goal. When you’re finished with this course, you’ll have the skills and knowledge to obtain the information needed to respond effectively to a cybersecurity incident in a timely manner.
course will teach you how to use Bash scripts to collect
system information, such as log files, registry keys,
and how to perform file and data analysis during a
cybersecurity incident response.
Responding to cybersecurity incidents is a challenging task. In this day and age a proper response can make all the difference between losing millions and even billions of dollars and steering the enterprise back on the right track to profitable business operations. In this course, System and File Analysis with Bash, you’ll learn to write and leverage Bash scripts in the context of a cybersecurity incident response. First, you’ll explore gathering and collecting system information with Bash scripts. Next, you’ll discover how to perform file and data analysis based on the information you have gathered. Finally, you’ll learn how to prioritize the decisive actions you need to take to prevent or mitigate a breach and communicate effectively to achieve this goal. When you’re finished with this course, you’ll have the skills and knowledge to obtain the information needed to respond effectively to a cybersecurity incident in a timely manner.
Syllabus
- Course Overview 1min
- Incident Response (IR) 7mins
- Data Collection 46mins
- File Analysis 35mins
- Data Analysis 16mins
Taught by
George Smith
Related Courses
Введение в LinuxBioinformatics Institute via Stepik Linux Tools for Developers
Linux Foundation via Coursera Using Python to Interact with the Operating System
Google via Coursera Scripting Bash - Découverte du Langage de Programmation
Coursera Project Network via Coursera Automation Scripts Using Bash
Coursera Project Network via Coursera