Linux Security (LFS416) - Course Outline

Next Available Class

Virtual

-

$2,500

On Sale Now

$2,125

before September 3

Enroll Now

Corporate Approval Toolkit

A text icon linking to the trainign quote page

Course Outline

« Return to Course Description.

  1. Introduction
    • Linux Foundation
    • Linux Foundation Training
    • Logistics
  2. Introduction to Security
    • What is Security
  3. Threats and Risk Assessment
    • Types of Attacks
    • Trade Offs
  4. Physical Access
    • Physical Security
    • Hardware Security
    • Understanding the Linux Boot Process
  5. Logging
    • Logging Overview
    • Syslog Services
    • The Linux Kernel Audit Daemon
    • Linux Firewall Logging
    • Log Reports
  6. Auditing and Detection
    • Auditing Basics
    • Understanding an Attack Progression
    • Detecting an Attack
    • Intrusion Detection Systems
  7. Application Security
    • Bugs, Beetles, and More
    • Tracking and Documenting Changes
    • Resource Access Control
    • Mitigation Techniques
    • Policy Based Access Control Frameworks
    • Real World Example
  8. Kernel Vulnerabilities
    • Kernel and User Spaces
    • Bugs
    • Mitigating Kernel Vulnerabilities
    • Vulnerabilities Examples
  9. Authentication
    • Encryption and Authentication
    • Passwords
    • Hardware Tokens
    • Biometric Authentication
    • Network and Centralized Authentication
  10. Local System Security
    • Standard UNIX Permissions
    • Administrator Account
    • Advanced UNIX Permissions
    • Filesystem Integrity
    • Filesystem Quotas
  11. Network Security
    • TCP/IP Protocols Review
    • Remote Trust Vectors
    • Remote Exploits
  12. Network Services Security
    • Network Tools
    • Databases
    • Web Server
    • File Servers
  13. Denial of Service
    • Network Basics
    • DoS Methods
    • Mitigation Techniques
  14. Remote Access
    • Unencrypted Protocols
    • Accessing Windows Systems
    • SSH
    • IPSEC VPNs
  15. Firewalling and Packet Filtering
    • Firewalling Basics
    • Netfilter (IPTables)
    • Netfilter Implementation
    • Mitigate Brute Force Login Attempts
  16. Response and Mitigation
    • Preparation
    • During an Incident
    • Handling Incident Aftermath
  17. Conclusion

« Return to Course Description.