{"id":27280,"date":"2025-01-29T10:56:24","date_gmt":"2025-01-29T15:56:24","guid":{"rendered":"https:\/\/www.lpi.org\/articles\/\/"},"modified":"2025-03-03T10:10:20","modified_gmt":"2025-03-03T15:10:20","slug":"with-lpis-help-eilay-yosfan-on-linux-skills-for-cybersecurity","status":"publish","type":"post","link":"https:\/\/www.lpi.org\/de\/blog\/2025\/01\/29\/with-lpis-help-eilay-yosfan-on-linux-skills-for-cybersecurity\/","title":{"rendered":"With LPI&#8217;s Help: Eilay Yosfan on Linux Skills for Cybersecurity"},"content":{"rendered":"<p>I am <a href=\"https:\/\/www.linkedin.com\/in\/eilay-yosfan-80b1011b8\/\">Eilay Yosfan<\/a>, a Threat Researcher at Security Joes, where my role involves analyzing and addressing complex security incidents across both Linux and Windows environments. During my career, I often found that my limited experience with Linux hindered my ability to fully investigate and understand Linux-specific incidents. This knowledge gap sometimes affected my capacity to extract and identify critical artifacts during investigations, sparking my desire to deepen my expertise in this domain.<\/p>\n<h2>LPI\u2019s &#8222;Essentialses&#8220; as Work Tools<\/h2>\n<p>My search for comprehensive learning resources led me to the Linux Professional Institute (LPI). I was drawn to their structured certification path, which promised to build a solid foundation in Linux. Being meticulous by nature, I knew I had to start from the basics to ensure thorough understanding and mastery. I decided to pursue the <a href=\"https:\/\/www.lpi.org\/our-certifications\/linux-essentials-overview\/\">Linux Essentials<\/a> and <a href=\"https:\/\/www.lpi.org\/our-certifications\/security-essentials-overview\/\">Security Essentials<\/a> certificates as my first steps.<\/p>\n<p>Completing these certificates was an eye-opening experience. They equipped me with a better grasp of how Linux operates under the hood, including its processes, file systems, and security mechanisms. The coursework and the exams challenged me to become proficient not only in using Linux but also in understanding its deeper intricacies. These skills were invaluable when it came to interacting with and analyzing Linux systems, and they transformed my professional approach to threat research.<\/p>\n<p>Beyond enhancing my investigative capabilities, these certificates had a notable impact on my development work. I am the author of <a href=\"https:\/\/github.com\/securityjoes\/MasterParser\">MasterParser<\/a>, an open-source DFIR tool hosted on Security Joes\u2019s GitHub page. MasterParser is specifically designed for the analysis of Linux logs, focusing on the \/var\/log directory, and it is an integral part of my forensic toolkit. The knowledge I gained through my certifications greatly contributed to my ability to build and refine this tool, making it more effective for parsing and analyzing critical log data during incident response.<\/p>\n<h2>What next!?<\/h2>\n<p>Looking ahead, my journey with LPI is far from over. I am now preparing to tackle <a href=\"https:\/\/www.lpi.org\/our-certifications\/lpic-1-overview\/\">LPIC-1<\/a>, the next level in LPI\u2019s certification path. I am eager to continue developing my expertise, not only to enhance my technical skill set but also to become an even more capable Incident Responder, threat researcher, and contributor to the cybersecurity community.<\/p>\n<p>By sharing my journey, I hope to inspire other professionals who may feel limited by gaps in their knowledge. The path to expertise is not always straightforward, but with dedication and the right resources, significant growth is possible.<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/www.lpi.org\/blog\/2024\/12\/05\/a-transformative-force-sonia-ben-othman-and-lpi-in-north-africa\/\">&lt;&lt; Read the previous post of this series<\/a> | <a href=\"https:\/\/www.lpi.org\/success-stories\/\">Read more LPI success stories here &gt;&gt;<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>I am Eilay Yosfan, a Threat Researcher at Security Joes, where my role involves analyzing and addressing complex security incidents across both Linux and Windows environments. During my career, I often found that my limited experience with Linux hindered my &#8230; <a href=\"https:\/\/www.lpi.org\/de\/blog\/2025\/01\/29\/with-lpis-help-eilay-yosfan-on-linux-skills-for-cybersecurity\/\" class=\"button-link\">Weiterlesen<\/a><\/p>\n","protected":false},"author":113,"featured_media":27302,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[8],"country":[158],"language":[431],"ppma_author":[575],"class_list":["post-27280","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-non-categorizzato","country-israel","language-english-it"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>With LPI&#039;s Help: Eilay Yosfan on Linux Skills for Cybersecurity - Linux Professional Institute (LPI)<\/title>\n<meta name=\"description\" content=\"Explore Eilay Yosfan&#039;s journey mastering Linux with LPI for robust cybersecurity skills. Dive in and read his blog post!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.lpi.org\/de\/blog\/2025\/01\/29\/with-lpis-help-eilay-yosfan-on-linux-skills-for-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"With LPI&#039;s Help: Eilay Yosfan on Linux Skills for Cybersecurity\" \/>\n<meta property=\"og:description\" content=\"Explore Eilay Yosfan&#039;s journey mastering Linux with LPI for robust cybersecurity skills. Dive in and read his blog post!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.lpi.org\/de\/blog\/2025\/01\/29\/with-lpis-help-eilay-yosfan-on-linux-skills-for-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Linux Professional Institute (LPI)\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/LPIConnect\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-29T15:56:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-03T15:10:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.lpi.org\/wp-content\/uploads\/2025\/01\/article-Eilay-Yosfan-Cybersecurity.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1440\" \/>\n\t<meta property=\"og:image:height\" content=\"994\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Eilay Yosfan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@lpiconnect\" \/>\n<meta name=\"twitter:site\" content=\"@lpiconnect\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"Eilay Yosfan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"2\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.lpi.org\\\/de\\\/blog\\\/2025\\\/01\\\/29\\\/with-lpis-help-eilay-yosfan-on-linux-skills-for-cybersecurity\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.lpi.org\\\/de\\\/blog\\\/2025\\\/01\\\/29\\\/with-lpis-help-eilay-yosfan-on-linux-skills-for-cybersecurity\\\/\"},\"author\":{\"name\":\"Eilay Yosfan\",\"@id\":\"https:\\\/\\\/www.lpi.org\\\/de\\\/#\\\/schema\\\/person\\\/41b0088f36c05db2a2993ba6ebae6581\"},\"headline\":\"With LPI&#8217;s Help: Eilay Yosfan on Linux Skills for Cybersecurity\",\"datePublished\":\"2025-01-29T15:56:24+00:00\",\"dateModified\":\"2025-03-03T15:10:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.lpi.org\\\/de\\\/blog\\\/2025\\\/01\\\/29\\\/with-lpis-help-eilay-yosfan-on-linux-skills-for-cybersecurity\\\/\"},\"wordCount\":435,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.lpi.org\\\/de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.lpi.org\\\/de\\\/blog\\\/2025\\\/01\\\/29\\\/with-lpis-help-eilay-yosfan-on-linux-skills-for-cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.lpi.org\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/article-Eilay-Yosfan-Cybersecurity.jpg\",\"articleSection\":[\"Non categorizzato\"],\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.lpi.org\\\/de\\\/blog\\\/2025\\\/01\\\/29\\\/with-lpis-help-eilay-yosfan-on-linux-skills-for-cybersecurity\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.lpi.org\\\/de\\\/blog\\\/2025\\\/01\\\/29\\\/with-lpis-help-eilay-yosfan-on-linux-skills-for-cybersecurity\\\/\",\"url\":\"https:\\\/\\\/www.lpi.org\\\/de\\\/blog\\\/2025\\\/01\\\/29\\\/with-lpis-help-eilay-yosfan-on-linux-skills-for-cybersecurity\\\/\",\"name\":\"With LPI's Help: Eilay Yosfan on Linux Skills for Cybersecurity - Linux Professional Institute (LPI)\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.lpi.org\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.lpi.org\\\/de\\\/blog\\\/2025\\\/01\\\/29\\\/with-lpis-help-eilay-yosfan-on-linux-skills-for-cybersecurity\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.lpi.org\\\/de\\\/blog\\\/2025\\\/01\\\/29\\\/with-lpis-help-eilay-yosfan-on-linux-skills-for-cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.lpi.org\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/article-Eilay-Yosfan-Cybersecurity.jpg\",\"datePublished\":\"2025-01-29T15:56:24+00:00\",\"dateModified\":\"2025-03-03T15:10:20+00:00\",\"description\":\"Explore Eilay Yosfan's journey mastering Linux with LPI for robust cybersecurity skills. Dive in and read his blog post!\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.lpi.org\\\/de\\\/blog\\\/2025\\\/01\\\/29\\\/with-lpis-help-eilay-yosfan-on-linux-skills-for-cybersecurity\\\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.lpi.org\\\/de\\\/blog\\\/2025\\\/01\\\/29\\\/with-lpis-help-eilay-yosfan-on-linux-skills-for-cybersecurity\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/www.lpi.org\\\/de\\\/blog\\\/2025\\\/01\\\/29\\\/with-lpis-help-eilay-yosfan-on-linux-skills-for-cybersecurity\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.lpi.org\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/article-Eilay-Yosfan-Cybersecurity.jpg\",\"contentUrl\":\"https:\\\/\\\/www.lpi.org\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/article-Eilay-Yosfan-Cybersecurity.jpg\",\"width\":1440,\"height\":994,\"caption\":\"With LPI's Help: Eilay Yosfan on Linux Skills for Cybersecurity\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.lpi.org\\\/de\\\/blog\\\/2025\\\/01\\\/29\\\/with-lpis-help-eilay-yosfan-on-linux-skills-for-cybersecurity\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.lpi.org\\\/de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"With LPI&#8217;s Help: Eilay Yosfan on Linux Skills for Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.lpi.org\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/www.lpi.org\\\/de\\\/\",\"name\":\"Linux Professional Institute (LPI)\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.lpi.org\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.lpi.org\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.lpi.org\\\/de\\\/#organization\",\"name\":\"Linux Professional Institute (LPI)\",\"url\":\"https:\\\/\\\/www.lpi.org\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/www.lpi.org\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.lpi.org\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/logo.png\",\"contentUrl\":\"https:\\\/\\\/www.lpi.org\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/logo.png\",\"width\":496,\"height\":175,\"caption\":\"Linux Professional Institute (LPI)\"},\"image\":{\"@id\":\"https:\\\/\\\/www.lpi.org\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/LPIConnect\",\"https:\\\/\\\/x.com\\\/lpiconnect\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/35136\",\"https:\\\/\\\/www.instagram.com\\\/lpi_org\\\/\",\"https:\\\/\\\/fosstodon.org\\\/@LPI\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.lpi.org\\\/de\\\/#\\\/schema\\\/person\\\/41b0088f36c05db2a2993ba6ebae6581\",\"name\":\"Eilay Yosfan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/www.lpi.org\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/cropped-eilay-yosfan-96x96.jpg79c16896f43001942df6d1afee302cb4\",\"url\":\"https:\\\/\\\/www.lpi.org\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/cropped-eilay-yosfan-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/www.lpi.org\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/cropped-eilay-yosfan-96x96.jpg\",\"caption\":\"Eilay Yosfan\"},\"description\":\"Eilay Yosfan is a Threat Researcher, Incident Responder at Security Joes, YouTube filmmaker, and PowerShell Developer with a Jujitsu black belt\u2014making him equally skilled at tackling threats in both the digital and physical worlds. Passionate about cybersecurity since the age of 14, he has developed DFIR tools like MasterParser and ForensicMiner, which have been showcased at events like Black Hat and CONFidence and are trusted by professionals across the industry.\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"With LPI's Help: Eilay Yosfan on Linux Skills for Cybersecurity - Linux Professional Institute (LPI)","description":"Explore Eilay Yosfan's journey mastering Linux with LPI for robust cybersecurity skills. Dive in and read his blog post!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.lpi.org\/de\/blog\/2025\/01\/29\/with-lpis-help-eilay-yosfan-on-linux-skills-for-cybersecurity\/","og_locale":"de_DE","og_type":"article","og_title":"With LPI's Help: Eilay Yosfan on Linux Skills for Cybersecurity","og_description":"Explore Eilay Yosfan's journey mastering Linux with LPI for robust cybersecurity skills. Dive in and read his blog post!","og_url":"https:\/\/www.lpi.org\/de\/blog\/2025\/01\/29\/with-lpis-help-eilay-yosfan-on-linux-skills-for-cybersecurity\/","og_site_name":"Linux Professional Institute (LPI)","article_publisher":"https:\/\/www.facebook.com\/LPIConnect","article_published_time":"2025-01-29T15:56:24+00:00","article_modified_time":"2025-03-03T15:10:20+00:00","og_image":[{"width":1440,"height":994,"url":"https:\/\/www.lpi.org\/wp-content\/uploads\/2025\/01\/article-Eilay-Yosfan-Cybersecurity.jpg","type":"image\/jpeg"}],"author":"Eilay Yosfan","twitter_card":"summary_large_image","twitter_creator":"@lpiconnect","twitter_site":"@lpiconnect","twitter_misc":{"Verfasst von":"Eilay Yosfan","Gesch\u00e4tzte Lesezeit":"2\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.lpi.org\/de\/blog\/2025\/01\/29\/with-lpis-help-eilay-yosfan-on-linux-skills-for-cybersecurity\/#article","isPartOf":{"@id":"https:\/\/www.lpi.org\/de\/blog\/2025\/01\/29\/with-lpis-help-eilay-yosfan-on-linux-skills-for-cybersecurity\/"},"author":{"name":"Eilay Yosfan","@id":"https:\/\/www.lpi.org\/de\/#\/schema\/person\/41b0088f36c05db2a2993ba6ebae6581"},"headline":"With LPI&#8217;s Help: Eilay Yosfan on Linux Skills for Cybersecurity","datePublished":"2025-01-29T15:56:24+00:00","dateModified":"2025-03-03T15:10:20+00:00","mainEntityOfPage":{"@id":"https:\/\/www.lpi.org\/de\/blog\/2025\/01\/29\/with-lpis-help-eilay-yosfan-on-linux-skills-for-cybersecurity\/"},"wordCount":435,"commentCount":0,"publisher":{"@id":"https:\/\/www.lpi.org\/de\/#organization"},"image":{"@id":"https:\/\/www.lpi.org\/de\/blog\/2025\/01\/29\/with-lpis-help-eilay-yosfan-on-linux-skills-for-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.lpi.org\/wp-content\/uploads\/2025\/01\/article-Eilay-Yosfan-Cybersecurity.jpg","articleSection":["Non categorizzato"],"inLanguage":"de","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.lpi.org\/de\/blog\/2025\/01\/29\/with-lpis-help-eilay-yosfan-on-linux-skills-for-cybersecurity\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.lpi.org\/de\/blog\/2025\/01\/29\/with-lpis-help-eilay-yosfan-on-linux-skills-for-cybersecurity\/","url":"https:\/\/www.lpi.org\/de\/blog\/2025\/01\/29\/with-lpis-help-eilay-yosfan-on-linux-skills-for-cybersecurity\/","name":"With LPI's Help: Eilay Yosfan on Linux Skills for Cybersecurity - Linux Professional Institute (LPI)","isPartOf":{"@id":"https:\/\/www.lpi.org\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.lpi.org\/de\/blog\/2025\/01\/29\/with-lpis-help-eilay-yosfan-on-linux-skills-for-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/www.lpi.org\/de\/blog\/2025\/01\/29\/with-lpis-help-eilay-yosfan-on-linux-skills-for-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.lpi.org\/wp-content\/uploads\/2025\/01\/article-Eilay-Yosfan-Cybersecurity.jpg","datePublished":"2025-01-29T15:56:24+00:00","dateModified":"2025-03-03T15:10:20+00:00","description":"Explore Eilay Yosfan's journey mastering Linux with LPI for robust cybersecurity skills. Dive in and read his blog post!","breadcrumb":{"@id":"https:\/\/www.lpi.org\/de\/blog\/2025\/01\/29\/with-lpis-help-eilay-yosfan-on-linux-skills-for-cybersecurity\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.lpi.org\/de\/blog\/2025\/01\/29\/with-lpis-help-eilay-yosfan-on-linux-skills-for-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.lpi.org\/de\/blog\/2025\/01\/29\/with-lpis-help-eilay-yosfan-on-linux-skills-for-cybersecurity\/#primaryimage","url":"https:\/\/www.lpi.org\/wp-content\/uploads\/2025\/01\/article-Eilay-Yosfan-Cybersecurity.jpg","contentUrl":"https:\/\/www.lpi.org\/wp-content\/uploads\/2025\/01\/article-Eilay-Yosfan-Cybersecurity.jpg","width":1440,"height":994,"caption":"With LPI's Help: Eilay Yosfan on Linux Skills for Cybersecurity"},{"@type":"BreadcrumbList","@id":"https:\/\/www.lpi.org\/de\/blog\/2025\/01\/29\/with-lpis-help-eilay-yosfan-on-linux-skills-for-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.lpi.org\/de\/"},{"@type":"ListItem","position":2,"name":"With LPI&#8217;s Help: Eilay Yosfan on Linux Skills for Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/www.lpi.org\/de\/#website","url":"https:\/\/www.lpi.org\/de\/","name":"Linux Professional Institute (LPI)","description":"","publisher":{"@id":"https:\/\/www.lpi.org\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.lpi.org\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.lpi.org\/de\/#organization","name":"Linux Professional Institute (LPI)","url":"https:\/\/www.lpi.org\/de\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.lpi.org\/de\/#\/schema\/logo\/image\/","url":"https:\/\/www.lpi.org\/wp-content\/uploads\/2023\/04\/logo.png","contentUrl":"https:\/\/www.lpi.org\/wp-content\/uploads\/2023\/04\/logo.png","width":496,"height":175,"caption":"Linux Professional Institute (LPI)"},"image":{"@id":"https:\/\/www.lpi.org\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/LPIConnect","https:\/\/x.com\/lpiconnect","https:\/\/www.linkedin.com\/company\/35136","https:\/\/www.instagram.com\/lpi_org\/","https:\/\/fosstodon.org\/@LPI"]},{"@type":"Person","@id":"https:\/\/www.lpi.org\/de\/#\/schema\/person\/41b0088f36c05db2a2993ba6ebae6581","name":"Eilay Yosfan","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.lpi.org\/wp-content\/uploads\/2025\/01\/cropped-eilay-yosfan-96x96.jpg79c16896f43001942df6d1afee302cb4","url":"https:\/\/www.lpi.org\/wp-content\/uploads\/2025\/01\/cropped-eilay-yosfan-96x96.jpg","contentUrl":"https:\/\/www.lpi.org\/wp-content\/uploads\/2025\/01\/cropped-eilay-yosfan-96x96.jpg","caption":"Eilay Yosfan"},"description":"Eilay Yosfan is a Threat Researcher, Incident Responder at Security Joes, YouTube filmmaker, and PowerShell Developer with a Jujitsu black belt\u2014making him equally skilled at tackling threats in both the digital and physical worlds. Passionate about cybersecurity since the age of 14, he has developed DFIR tools like MasterParser and ForensicMiner, which have been showcased at events like Black Hat and CONFidence and are trusted by professionals across the industry."}]}},"views":1024,"authors":[{"term_id":575,"user_id":113,"is_guest":0,"slug":"eilay-yosfan","display_name":"Eilay Yosfan","avatar_url":"https:\/\/www.lpi.org\/wp-content\/uploads\/2025\/01\/cropped-eilay-yosfan-96x96.jpg","0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/www.lpi.org\/de\/wp-json\/wp\/v2\/posts\/27280","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.lpi.org\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.lpi.org\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.lpi.org\/de\/wp-json\/wp\/v2\/users\/113"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lpi.org\/de\/wp-json\/wp\/v2\/comments?post=27280"}],"version-history":[{"count":6,"href":"https:\/\/www.lpi.org\/de\/wp-json\/wp\/v2\/posts\/27280\/revisions"}],"predecessor-version":[{"id":27901,"href":"https:\/\/www.lpi.org\/de\/wp-json\/wp\/v2\/posts\/27280\/revisions\/27901"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.lpi.org\/de\/wp-json\/wp\/v2\/media\/27302"}],"wp:attachment":[{"href":"https:\/\/www.lpi.org\/de\/wp-json\/wp\/v2\/media?parent=27280"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.lpi.org\/de\/wp-json\/wp\/v2\/categories?post=27280"},{"taxonomy":"country","embeddable":true,"href":"https:\/\/www.lpi.org\/de\/wp-json\/wp\/v2\/country?post=27280"},{"taxonomy":"language","embeddable":true,"href":"https:\/\/www.lpi.org\/de\/wp-json\/wp\/v2\/language?post=27280"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.lpi.org\/de\/wp-json\/wp\/v2\/ppma_author?post=27280"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}