Linux Security (LFS416) - Course Outline

Enroll now in an upcoming course

Virtual

-

$2,900

Early Bird Discount

$2,474

before October 17

Enroll Now

5% COURSE DISCOUNT

Register for our monthly training newsletter to stay informed about upcoming courses and new free content and you'll get a 5% discount off your first course.

A text icon linking to the trainign quote page

Course Outline

« Return to Course Description.

  1. Security Concepts
    • Overview
    • Security As A Process
    • Security In Depth
    • Three Core Principles
    • Best Practices
    • Cryptography
  2. Threats \& Risk Assessment
    • Overview
    • Risk Assessment
    • Attackers
    • Kinds Of Attacks
    • Summary
  3. Physical Access
    • Overview
    • Boot Sequence
    • Common Attacks
    • Removable Media
    • Cryptography
    • Summary
  4. Kernel Vulnerabilities
    • Overview
    • Concepts
    • Bugs
    • Mitigation
  5. Application Vulnerabilities
    • Overview
    • Concepts
    • Features
    • Historical
  6. Denial Of Service
    • Overview
    • Concepts
    • Local Attacks
    • Remote Attacks
    • Historical Examples
  7. Local Authentication
    • Overview
    • Passwords
    • Hardware Tokens
    • Summary
  8. Remote Authentication
    • Overview
    • Passwords
    • Public Key Cryptography
    • One Time Pads
    • Distributed Authentication
  9. Local System Security
    • Overview
    • Standard Unix Permissions
    • Advanced Unix Permissions
    • Summary
  10. Network Security
    • Overview
    • Kernel Tuning
    • Remote Exploits
    • Remote Trust
  11. Remote Access
    • Overview
    • Bad Protocols
    • SSH
    • Tunneling
    • Virtual Private Networking
    • IPv6
  12. Packet Filtering
    • Overview
    • Protocol Overview
    • Packet Filtering
    • Packet Filtering in Linux
    • Tables
    • The Filter Table
    • The NAT Table
    • The Mangle Table
    • Targets
    • State
    • LOGGING
    • Network Address Translation
  13. Network Security
    • Overview
    • Kernel Tuning
    • Remote Exploits
    • Remote Trust
    • Summary
  14. Security Tools Overview
    • Overview
    • Summary
  15. Logging
    • Overview
    • Summary
  16. Auditing \& Detection
    • Overview
    • Vulnerability Detection
    • Intrusion Detection
    • Summary
  17. Response \& Mitigation
    • Overview
    • Policy
    • Escalation
    • Summary

« Return to Course Description.