This doc gives a condensed overview of methods for assessing if a Linux system is compromised and how to analyse it. - I use it personnaly to improve and keep my Linux defense knowledge up-to-date.
This doc is a compilation of techniques/information learned from following sources (thank you for sharing this great content):