Resource Center

Webinars Webinars

Tips & Tricks // Analyzing Linux Artifacts

You never know where your investigation may take you; and you need to be prepared to investigate evidence wherever it may be, including Linux.

Whether you’re working a malware or ransomware incident response case in an enterprise setting or you show up to a crime scene and your suspect’s computer is a Linux system, having a base-level understanding of Linux artifacts and how to analyze them will keep your investigation moving.

In this Tips & Tricks session we’ll highlight some important Linux artifacts including User Accounts, SSH Activity, System Logs—and more—and how they can be analyzed using AXIOM Cyber or AXIOM.

Certificates

After viewing this webinar you will be issued a certificate by email documenting that you have taken part in the session. 

This session has ended. You can view the recording here

Start modernizing your digital investigations today.

Ready to explore on your own? Start a Free Trial

Top