Recovering from a System Compromise | Top Docs

Subscribers:
1,040,000
Published on ● Video Link: https://www.youtube.com/watch?v=hGzoVYT_Hu8



Duration: 14:03
1,431 views
48


If you suspect that an unauthorized user has gained access to your Linode, your system could be considered compromised. Unfortunately, it’s virtually impossible to determine the full scope of an attacker’s reach into a compromised system. This video shows several methods to recover from a system compromise.

Chapters:
0:00 Introduction
0:55 Rebuilding Your Linode
4:07 Accessing Rescue Mode
6:26 Cloning Your Linode
10:59 Mounting Your Cloned Linode
13:18 Conclusion

New to Cloud Computing? Get started here with a $100 credit → https://www.linode.com/lp/youtube-viewers/?ifso=linodetube&utm_source=youtube&utm_medium=TopDocs
Read the doc associated with this video → https://www.linode.com/docs/guides/recovering-from-a-system-compromise/
Learn more about cloud security → https://www.linode.com/docs/guides/security/
Subscribe to get notified of new episodes as they come out → https://www.youtube.com/linode?sub_confirmation=1

#Linode #AlternativeCloud #CloudSecurity #Linux
Product: Linode, Linux, Infosec; Jay LaCroix;







Tags:
linode
linux
cloud computing
alternative cloud
linux server
open source
sysadmin
hacking
cybersecurity
software engineer
software security
cloud security
linux security
incident response
cyber security
information security
infosec
security awareness
security incident response
digital forensics
cyber threat intelligence
cyber security tutorial
cybersecurity training
detection and response
cyber risk management
incident response planning
vps security