tunnel ids exfiltration security adversary simulations blueteam redteam whitelist ips signatures edr network protocols lateral movements education and training linux security profiling open source information security selinux svirt linux hardening docker isolation
See more