Course Outline

Linux Security

  1. Introduction
    • Linux Foundation
    • Linux Foundation Training
    • Laboratory Exercises, Solutions and Resources
    • Distribution Details
    • Lab Setup
    • Registration
    • Labs
  2. Security Basics
    • What is Security?
    • Assessment
    • Prevention
    • Detection
    • Reaction
    • Labs
  3. Threats and Risk Assessment
    • Classes of Attackers
    • Types of Attacks
    • Trade Offs
    • Labs
  4. Physical Access
    • Physical Security
    • Hardware Security
    • Understanding the Linux Boot Process
    • Labs
  5. Logging
    • Logging Overview
    • Syslog Services
    • The Linux Kernel Audit Daemon
    • Linux Firewall Logging
    • Log Reports
    • Labs
  6. Auditing and Detection
    • Auditing Basics
    • Understanding an Attack Progression
    • Detecting an Attack
    • Intrusion Detection Systems
    • Labs
  7. Application Security
    • Bugs and Tools
    • Tracking and Documenting Changes
    • Resource Access Control
    • Mitigation Techniques
    • Policy Based Access Control Frameworks
    • Real World Example
    • Labs
  8. Kernel Vulnerabilities
    • Kernel and User Spaces
    • Bugs
    • Mitigating Kernel Vulnerabilities
    • Vulnerabilities Examples
    • Labs
  9. Authentication
    • Encryption and Authentication
    • Passwords and PAM
    • Hardware Tokens
    • Biometric Authentication
    • Network and Centralized Authentication
    • Labs
  10. Local System Security
    • Standard UNIX Permissions
    • Administrator Account
    • Advanced UNIX Permissions
    • Filesystem Integrity
    • Filesystem Quotas
    • Labs
  11. Network Security
    • TCP/IP Protocols Review
    • Remote Trust Vectors
    • Remote Exploits
    • Labs
  12. Network Services Security
    • Network Tools
    • Databases
    • Web Server
    • File Servers
    • Labs
  13. Denial of Service
    • Network Basics
    • DoS Methods
    • Mitigation Techniques
    • Labs
  14. Remote Access
    • Unencrypted Protocols
    • Accessing Windows Systems
    • SSH
    • IPSEC VPNs
    • Labs
  15. Firewalling and Packet Filtering
    • Firewalling Basics
    • iptables
    • Netfilter Implementation
    • Netfilter rule management
    • Mitigate Brute Force Login Attempts
    • Labs
  16. Response and Mitigation
    • Preparation
    • During an Incident
    • Handling Incident Aftermath
    • Labs