This project simulates threat detection in Linux environments using log analysis and basic detection rules.
- Detect brute force login attempts
- Identify unauthorized privilege escalation
- Simulate security monitoring scenarios
- Authentication logs
- System logs
- Sudo activity
Multiple failed login attempts detected
Unauthorized sudo usage identified
Basic rules are applied using shell scripts to simulate security monitoring.
- Log analysis for security
- Detection of suspicious behavior
- Basic threat detection techniques
This lab simulates how security teams detect:
- Unauthorized access attempts
- Privilege misuse
- Potential attacks in infrastructure environments
Security monitoring is based on identifying patterns in logs and correlating events to detect threats.