Overview
Master Linux incident response and threat hunting to defend the systems that power critical infrastructure. Learn to identify, analyze, and respond to attacks on Linux platforms.
FOR577 is the leading Linux incident response course, teaching skills to find stealthy attackers who bypass existing controls using the SANS SIFT Workstation.
What You Will Learn:
Incident Response Fundamentals
- Apply the SANS six-step IR methodology to Linux
- Collect and preserve forensic evidence
- Analyze disk images and file systems
- Understand Linux-specific forensic challenges
Log Analysis and Detection
- Parse and analyze Linux system logs
- Investigate authentication and application logs
- Work with AuditD and the system journal
- Correlate events across log sources
Enterprise Response
- Scale incident response with EDR tools
- Deploy OSSEC and Velociraptor for Linux
- Perform memory analysis and live response
- Build and run triage scripts
Advanced Techniques
- Create filesystem and super-timelines
- Detect and counter anti-forensic techniques
- Hunt for threats across Linux environments
- Develop threat intelligence from incidents
23 hands-on labs include SIFT Workstation orientation, Sleuth Kit introduction, system and log profiling, EDR tool deployment, triage tool execution, timeline creation and analysis, and a comprehensive APT Incident Response Challenge.
The capstone challenge is based on a real-world APT group, testing your skills to uncover initial compromise, lateral movement, and data exfiltration.
Prepares for GIAC GLIR certification (exam sold separately). Ideal for Incident Responders, Threat Hunters, SOC Analysts, and Security Professionals working with Linux systems.
36 CPE credits. 6 days of expert-led training.
Highlights
- Detect and contain adversaries on Linux systems using the SIFT Workstation. Perform timeline analysis to track attacker activity. Investigate breach origins and lateral movement. Develop threat intelligence from incidents.
- 23 hands-on labs covering SIFT Workstation, Sleuth Kit forensics, log analysis, EDR deployment, triage techniques, timeline creation, and an APT Incident Response Challenge based on a real-world attack.
- Prepares for GIAC GLIR certification (exam sold separately). Ideal for incident responders and threat hunters. 6 days of expert-led training. Earn 36 CPE credits.
Details
Introducing multi-product solutions
You can now purchase comprehensive solutions tailored to use cases and industries.
Features and programs
Financing for AWS Marketplace purchases
Pricing
Dimension | Description | Cost/12 months |
|---|---|---|
FOR577 - Single User | Single user license for DFIR - FOR577: LINUX IR & Threat Hunting | $8,780.00 |
Vendor refund policy
Refunds available within 30 days if course not accessed.
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
Software as a Service (SaaS)
SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.
Support
Vendor support
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.