YoVDO

Linux Monitoring and Logging - HackerSploit Linux Security

Offered By: Linode via YouTube

Tags

Linux Security Courses Log Analysis Courses

Course Description

Overview

Explore essential Linux monitoring and logging techniques in this comprehensive video tutorial. Gain insights into reading authentication logs, monitoring login activities using commands like 'last', and tracking failed and recent logins. Learn to utilize the 'who' command for user session information, and master resource monitoring with tools such as 'htop' and 'glances'. Discover the power of 'whowatch' for real-time user activity tracking. Enhance your Linux security skills and gain a deeper understanding of system events and resource utilization through practical demonstrations and expert guidance.

Syllabus

- Intro
- Introduction to Logs
- Reading auth Logs
- Using the last Command for Monitoring Logins
- Monitor Failed Logins
- Monitor Recent Logins
- Using The who Command
- Monitor Resource Use with htop
- Monitor Resource Use with glances
- Using The whowatch Command
- Wrapping Up


Taught by

Linode

Related Courses

Linux Server Management and Security
University of Colorado System via Coursera
Cybersecurity Roles, Processes & Operating System Security
IBM via Coursera
Operating Systems and Security
IBM via edX
Linux Security and Hardening, The Practical Security Guide.
Udemy
The Complete Cyber Security Course : Hackers Exposed!
Udemy