1. Linux Logging Fundamentals
$ core idea: Linux systems log through journald, syslog, or both. For defensive work, the relevant sources are authentication events, sudo and privilege escalation records, SSH activity, service logs, kernel messages, and web server access and error logs. The specific file paths vary by distribution and configuration — always verify in the actual environment rather than assuming standard locations.
$ defender angle: Retention and forwarding matter as much as collection. A log that rotates off the local system before an investigation starts is operationally equivalent to no log. Defenders should know the rotation policy and retention window for every system they are responsible for monitoring.
$ prove understanding: Identify key Linux and Windows log sources used in basic security investigations.