{"id":1686,"date":"2018-09-20T00:53:44","date_gmt":"2018-09-20T07:53:44","guid":{"rendered":"https:\/\/zed.inguardians.com\/?p=1686"},"modified":"2019-08-01T16:27:11","modified_gmt":"2019-08-01T23:27:11","slug":"how-to-attack-a-linux-system-ways-to-detect-and-respond-swiftly-part-of-the-beyondtrust-webinar-series","status":"publish","type":"post","link":"https:\/\/zed.inguardians.com\/presentations\/how-to-attack-a-linux-system-ways-to-detect-and-respond-swiftly-part-of-the-beyondtrust-webinar-series\/","title":{"rendered":"How to Attack a Linux System + Ways to Detect and Respond Swiftly (Part of the BeyondTrust webinar series)"},"content":{"rendered":"
Bad actors will target our Linux systems. With a small amount of effort, we can detect their first access to the system and stop them before they move laterally throughout. But how did they get into our systems in the first place? And what are the procedures for a swift detection and response?<\/p>\n
In this on-demand webinar join Jay Beale, co-founder and CTO of InGuardians, where he\u2019ll attack a Linux system, achieve initial access, escalate privilege, and then take the first step to move laterally. He\u2019ll then demonstrate how to detect the attack and automatically respond to it.<\/p>\n
From this session, attendees will:<\/p>\n
This is going to be an intensive and demo-centric webinar you won\u2019t want to miss.<\/p>\n
<\/p>\n
<\/p>\n
<\/p>\n