MCSI Certified DFIR Specialist
https://www.mosse-institute.com/certifications/mdfir-certified-dfir-specialist.html

MCSI Digital Forensics Library
https://library.mosse-institute.com/cyber-domains/digital-forensics.html

Linux Forensics Artifacts in a Users home Directory
https://library.mosse-institute.com/articles/2022/07/linux-forensics-artifacts-in-a-users-home-directory/linux-forensics-artifacts-in-a-users-home-directory.html#linux-forensics-artifacts-in-a-users-home-directory

Linux
https://library.mosse-institute.com/it-domains/linux.html

🧪 Setting up a lab to practice Linux Forensics 🧪
https://www.youtube.com/watch?v=Icf2P3xGb7U

In the video, we'll show you how to identify user artefacts in a Linux environment to aid your digital forensics investigation. Take note of the instructions and techniques we use, then test it out in your own home lab.

In Linux, the home directory is the directory where a user's personal files are stored. This is usually the same as the user's login name. The home directory is typically located in the /home directory. When a user logs in, they are automatically placed in their home directory. From here, the user can access their personal files and folders.

In a forensic investigation, the contents of the home directory can give investigators insight into the user's habits and activities. For example, looking at the user's browser history or chat logs can reveal important information about their behavior. Additionally, the home directory can also contain important evidence such as deleted files or hidden folders. By examining the contents of a user's home directory, investigators can gain a better understanding of the user and their activities.