In this section
LX0.6 Course Structure and Connections
How This Course Is Organized — and Where It Connects
Three Phases, One Methodology
This course follows the same investigation methodology as the Practical IR: Windows and M365 course — the six-step pattern (what to look for, where to find it, how to extract it, how to interpret it, what it proves, what to do next) applied to a different operating system with different evidence sources and different tools. An investigator who completes both courses can follow an attacker across any environment: Windows endpoints, M365 cloud services, Linux servers, containers, and cloud VMs.
Phase 1 (Foundation — LX0 through LX3) builds the evidence model. You are here in LX0, learning where evidence lives and why the Linux investigation approach is structurally different from Windows. LX1 teaches the collection toolkit — UAC, live response commands, cloud-specific collection methods. LX2 teaches filesystem forensics — ext4 inodes, timestamps, deleted file recovery, timeline generation with plaso and Sleuth Kit. LX3 teaches log analysis — syslog, journald, auditd, authentication logs, web server logs, and the query techniques that extract investigation answers from each source. These four modules provide the foundational skills for every scenario in Phase 2.
# === LEARNING PATH READINESS CHECK ===
# Check 1: Do you have a Linux system for practice?
echo "=== LAB ENVIRONMENT ==="
uname -a # Should show a Linux kernel (Ubuntu 22.04 recommended)
cat /etc/os-release | head -3
# Check 2: Are core investigation tools available?
echo "=== INVESTIGATION TOOLS ==="
which sleuthkit 2>/dev/null || which fls 2>/dev/null || echo "Sleuth Kit: NOT INSTALLED"
which volatility3 2>/dev/null || python3 -c "import volatility3" 2>/dev/null && echo "Volatility: OK" || echo "Volatility: NOT INSTALLED"
which yara 2>/dev/null || echo "YARA: NOT INSTALLED"
# Check 3: Are log analysis tools available?
echo "=== LOG ANALYSIS TOOLS ==="
which journalctl 2>/dev/null && echo "journalctl: OK"
which ausearch 2>/dev/null && echo "ausearch (auditd): OK" || echo "auditd: NOT INSTALLED"
which jq 2>/dev/null && echo "jq (JSON): OK" || echo "jq: NOT INSTALLED"
# Phase 1 (LX0-LX3): requires basic Linux command line proficiency
# Phase 2 (LX4-LX13): requires tools from Phase 1 + lab environment
# Phase 3 (LX14-LX16): requires understanding from Phase 2 scenariosTry it yourself
Try It — Map Your Learning Path
Try It — Map Your Learning PathBased on your current role and immediate needs, identify your priority modules. If you operate Linux web servers: prioritize LX5, LX6, LX7. If you manage Kubernetes: prioritize LX9. If you are building detection capability: prioritize LX15. Write down your top 3 priority modules and the order you will complete them.
Check your understanding:
1. What are the three phases of this course, and what capability does each phase build? 2. How do the investigation scenarios in Phase 2 connect to each other? 3. Which Northgate Engineering server is the primary target for the SSH brute force scenario, and why is it vulnerable? 4. An incident involves an AiTM phishing attack that leads to SSH access on a Linux server. Which two Ridgeline courses cover the full investigation?
You are investigating a Linux server and discover evidence of both a cryptominer (resource abuse) and an SSH key theft (lateral movement preparation). The cryptominer is consuming 95% CPU and impacting production. Which do you address first?
Address the lateral movement first. The cryptominer is visible, noisy, and contained to this server — it is causing performance impact but not spreading. The SSH key theft is silent, potentially already exploited, and may have given the attacker access to additional servers. Contain the lateral movement risk: rotate the stolen SSH keys, check the target servers for unauthorized access, and apply network restrictions. Then address the cryptominer: kill the process, remove the binary and persistence mechanisms. Prioritizing the noisy but contained threat over the silent but spreading threat is the most common Linux IR prioritization mistake.
Get weekly detection and investigation techniques
KQL queries, detection rules, and investigation methods — the same depth as this course, delivered every Tuesday.
No spam. Unsubscribe anytime. ~2,000 security practitioners.