{"id":1727,"date":"2017-07-06T20:22:49","date_gmt":"2017-07-07T03:22:49","guid":{"rendered":"https:\/\/zed.inguardians.com\/?p=1727"},"modified":"2019-07-29T17:09:33","modified_gmt":"2019-07-30T00:09:33","slug":"how-to-attack-a-linux-system-ways-to-detect-and-respond-swiftly-part-of-the-beyondtrust-webinar-series-2","status":"publish","type":"post","link":"https:\/\/zed.inguardians.com\/webinars\/how-to-attack-a-linux-system-ways-to-detect-and-respond-swiftly-part-of-the-beyondtrust-webinar-series-2\/","title":{"rendered":"How to Attack a Linux System + Ways to Detect and Respond Swiftly ( Part of the BeyondTrust webinar series)"},"content":{"rendered":"

Bad actors continue to target our Linux systems. With a small amount of effort, we can detect their first access to the system and stop them before they move laterally. But how did they get into our systems in the first place? And what are the procedures for a swift detection and response? In this on-demand webinar, Jay Beale, co-founder and CTO of InGuardians, will attack a Linux system, achieve initial access, escalate privilege, and then take the first step to move laterally. He\u2019ll then demonstrate how to detect the attack and automatically respond to it. Tune in to this session and:<\/p>\n