Identifying Intrusion and Mitigating Attacks with RHEL Server
Cyberscore

Did you know Cybrary has FREE video training? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.

Time
1 hour
Difficulty
Intermediate

This last lab is similar to the Windows Incident Response lab, but different in that this one requires you to run through the IR process in a Linux, more specifically a Red-Hat, environment. The same ...

Did you know Cybrary has FREE video training? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.

Overview

This last lab is similar to the Windows Incident Response lab, but different in that this one requires you to run through the IR process in a Linux, more specifically a Red-Hat, environment. The same IR methodologies and procedures apply in both environments; these include identifying any security-issues and their scope, containing the issues as best as possible, removing any present threats if found, recovery, and report-generation. Making sure you account for all of these is the key to sound IR work.