Linux Endpoint Security: Processes
Offered By: Pluralsight
Course Description
Overview
This course will teach you the basics of command line tools to work with processes on Linux.
Roles in cybersecurity require an seemingly insurmountable amount of implied knowledge. In this course, Linux Endpoint Security: Processes, you will gain a security focused, baseline understanding of how processes work on Linux systems, and command line tools to work with them. First, you will explore the use of PS and how files are mapped to processes. Next, you will work with pstree to understand the relationships between processes. Finally, you will learn how to leverage that understanding to track down activity on a Linux device. When you’re finished with this course, you’ll have the skills and knowledge of Linux processes, including simple tricks from advanced security practitioners that will enable you to continue advancing into more technical roles within security operations.
Roles in cybersecurity require an seemingly insurmountable amount of implied knowledge. In this course, Linux Endpoint Security: Processes, you will gain a security focused, baseline understanding of how processes work on Linux systems, and command line tools to work with them. First, you will explore the use of PS and how files are mapped to processes. Next, you will work with pstree to understand the relationships between processes. Finally, you will learn how to leverage that understanding to track down activity on a Linux device. When you’re finished with this course, you’ll have the skills and knowledge of Linux processes, including simple tricks from advanced security practitioners that will enable you to continue advancing into more technical roles within security operations.
Syllabus
- Course Overview 0mins
- Intro & Baselining with PS Coverage 7mins
- Discover Relationships with pstree 5mins
- Identify Anomalous Process with ps 11mins
Taught by
Aaron Rosenmund
Related Courses
Introduction to LinuxLinux Foundation via edX 操作系统原理(Operating Systems)
Peking University via Coursera Internet of Things: Setting Up Your DragonBoard™ Development Platform
University of California, San Diego via Coursera Information Security-3
Indian Institute of Technology Madras via Swayam Introduction to Embedded Systems Software and Development Environments
University of Colorado Boulder via Coursera