02. Introduction to the course

This chapter is a course introduction and the technical scope you can expect from the materials. By analyzing the current Linux threat landscape you will jump into the area of Linux attack paths/offensive operations vs detection engineering and live forensics inspections. This chapter is just an entry point to the broader true hands-on Linux/Network Purple Teaming journey I am going to kidnap you on during this course.