System and File Analysis with Bash
|
Welcome to System and File Analysis with Bash. This course will teach you how to use Bash scripts to collect system information, such as log files, registry keys, and how to perform file and data analysis during a cybersecurity incident response.
Responding to cybersecurity incidents is a challenging task. In this day and age a proper response can make all the difference between losing millions and even billions of dollars and steering the enterprise back on the right track to profitable business operations. In this course, System and File Analysis with Bash, you’ll learn to write and leverage Bash scripts in the context of a cybersecurity incident response. First, you’ll explore gathering and collecting system information with Bash scripts. Next, you’ll discover how to perform file and data analysis based on the information you have gathered. Finally, you’ll learn how to prioritize the decisive actions you need to take to prevent or mitigate a breach and communicate effectively to achieve this goal. When you’re finished with this course, you’ll have the skills and knowledge to obtain the information needed to respond effectively to a cybersecurity incident in a timely manner.
Author Name: George Smith
Author Description:
George Smith has spent more than 25 years in the IT industry. During this time he has held a variety of positions, starting with web UI development and business analysis, progressing with system administration and infrastructure, then switching to core systems programming, technical consulting, and finally becoming an E-Commerce Architect and Subject Matter Expert. He is well versed in modern trends like Containerization, Infrastructure as Code, Serverless computing models, and more. George demo… more
Table of Contents
- Course Overview
1min - Incident Response (IR)
7mins - Data Collection
46mins - File Analysis
35mins - Data Analysis
16mins
User Reviews
Be the first to review “System and File Analysis with Bash” Cancel reply
Related Products
The IT Ops Sessions: The Role of AIOps in Building a Digital Immune System
In this IT Ops session, you’ll learn how the application of artificial intelligence capabilities to automate and streamline operations will play a significant role in building “digital immunity” – a Gartner’s top strategic technology trend for 2023.
What’s New in CentOS 8
Filtering through the new features so you can find the most useful is always a challenge; by taking this course you will quickly be able to identify the new and best features of CentOS 8.
Introduction to the Linux Essentials 010-160 Exam
This brief course will introduce you to the rest of the Linux Essentials (Exam 010-160) learning path. The path gives you everything you'll need to prepare for and pass the Linux Professional Institute's introduction to Linux administration cert.
The IT Ops Sessions: Performance Troubleshooting with Generative AI and Wireshark
In this IT Ops session, you’ll learn about how you can use generative AI to analyze packet captures from Wireshark.
What’s New In RHEL 9
Red Hat Enterprise Linux (RHEL) 8 and 9 are very similar and you can prepare for either exam by working though the RHEL 8 courses. This course will teach you the minor differences between the two systems and the two exams.
The IT Ops Sessions: Up and Running with PowerShell Crescendo
In this IT Ops session, you'll discover how PowerShell Crescendo amplifies traditional command-line applications, and gain insights on how to begin crafting your own Crescendo modules.


There are no reviews yet.