1. Linux Logging Fundamentals
$ core idea: Linux systems commonly log through journald and/or syslog. Security-relevant sources include authentication events, sudo usage, SSH activity, service logs, kernel messages, and web server access/error logs.
$ defender angle: Defenders should understand how distro differences affect log locations and formats. For example, auth events may appear in different files depending on platform and configuration. Always verify actual logging paths in the environment instead of relying on memory.
$ prove understanding: Identify key Linux and Windows log sources used in basic security investigations.