LINUX Incident Response and Threat Hunting Poster

Master threat hunting techniques and learn to identify, analyze, and respond to incidents on Linux platforms. This poster highlights key processes and artifacts related to common attacks, along with effective tools and techniques for investigation. Use it as a handy cheat-sheet to remember where to find essential Linux artifacts, how to analyze them, and when they may be useful during an investigation. This poster is a resource developed from the FOR577: Linux Incident Response and Threat Hunting™ course, reflecting the expertise taught in the class, and was created by SANS Instructors Kat Hedley and Taz Wake.

March 3, 2025
Linux Incident Response Poster