Linux Security (LFS416)

Security is always a concern, and with major security holes like Shellshock and Heartbleed being announced regularly, it’s more critical than ever to secure the data you are liable for. This course will walk you through the many risks and threats that exist, show you how to use best practices and other open-source tools to mitigate or counteract those threats, and teach you what you need to know to detect and recover from those attacks that do happen.

$2950 Enroll Get A Quote

Course Overview

This advanced, completely hands-on course adopts a highly technical approach to cover important security techniques and tools. By providing visibility both into attack vectors and possible security holes, this course provides you a complete guide on how to mitigate security risks in any Linux environment.

Show More

You’ll learn:

  • How to assess security risks in your enterprise Linux environment.
  • The best techniques and tools to increase security.
  • Server hardening
  • How to deploy and use monitoring and attack detection tools.
  • How to gain visibility into possible vulnerabilities.
  • The art and science of developing your Linux security policy and response strategy.
  • How to configure your systems for compliance with HIPAA, DISA STIG, etc.

This course is designed to work with a wide range of Linux distributions, so you will be able to apply these concepts regardless of your distro.

Schedule

Instructor-Led
1/21/2019 - 1/24/2019
VIRTUAL
$2950 Add to cart Generate A Quote
If none of these fits your schedule, check out our Partner offerings >

Course Outline

  1. Introduction
    • Linux Foundation
    • Linux Foundation Training
    • Linux Foundation Certifications
    • Laboratory Exercises, Solutions and Resources
    • E-Learning Course: LFS216
    • Distribution Details
    • Labs
  2. Security Basics
    • What is Security?
    • Assessment
    • Prevention
    • Detection
    • Reaction
    • Labs
  3. Threats and Risk Assessment
    • Classes of Attackers
    • Types of Attacks
    • Trade Offs
    • Labs
  4. Physical Access
    • Physical Security
    • Hardware Security
    • Understanding the Linux Boot Process
    • Labs
  5. Logging
    • Logging Overview
    • Syslog Services
    • The Linux Kernel Audit Daemon
    • Linux Firewall Logging
    • Log Reports
    • Labs
  6. Auditing and Detection
    • Auditing Basics
    • Understanding an Attack Progression
    • Detecting an Attack
    • Intrusion Detection Systems
    • Labs
  7. Application Security
    • Bugs and Tools
    • Tracking and Documenting Changes
    • Resource Access Control
    • Mitigation Techniques
    • Policy Based Access Control Frameworks
    • Real World Example
    • Labs
  8. Kernel Vulnerabilities
    • Kernel and User Spaces
    • Bugs
    • Mitigating Kernel Vulnerabilities
    • Vulnerabilities Examples
    • Labs
  9. Authentication
    • Encryption and Authentication
    • Passwords and PAM
    • Hardware Tokens
    • Biometric Authentication
    • Network and Centralized Authentication
    • Labs
  10. Local System Security
    • Standard UNIX Permissions
    • Administrator Account
    • Advanced UNIX Permissions
    • Filesystem Integrity
    • Filesystem Quotas
    • Labs
  11. Network Security
    • TCP/IP Protocols Review
    • Remote Trust Vectors
    • Remote Exploits
    • Labs
  12. Network Services Security
    • Network Tools
    • Databases
    • Web Server
    • File Servers
    • Labs
  13. Denial of Service
    • Network Basics
    • DoS Methods
    • Mitigation Techniques
    • Labs
  14. Remote Access
    • Unencrypted Protocols
    • Accessing Windows Systems
    • SSH
    • IPSEC VPNs
    • Labs
  15. Firewalling and Packet Filtering
    • Firewalling Basics
    • iptables
    • Netfilter Implementation
    • Netfilter rule management
    • Mitigate Brute Force Login Attempts
    • Labs
  16. Response and Mitigation
    • Preparation
    • During an Incident
    • Handling Incident Aftermath
    • Labs
  17. Compliance testing with OSCAP
    • Compliance Testing
    • SCAP Introduction
    • OpenSCAP
    • SCAP Workbench
    • Command Line Scan
    • Labs

Prerequisites

Attendees should:

  • Have a solid understanding of core local system administration and networking concepts equivalent to that obtained from LFS301 Linux System Administration and LFS311 Linux Network Management.
  • Be experienced with Linux (or more generally UNIX), especially at the command line level.

At a Glance

Delivery Method

Live Online (Virtual)

Delivery Method

Live (Classroom)

Includes

  • 4 days of Instructor-led class time
  • Hands-on Labs & Assignments
  • Resources & Course Manual
  • 12 Months of Access to Online Course
  • Certificate of Completion
  • Free Chromebook

Experience Level

   Intermediate

Course Rating

   

Pro-Tip

Training 5 or more individuals?
Get a Corporate Quote >

chromebook

Get training and a free Chromebook.

When you train with The Linux Foundation you’re already getting the best open source training straight from the source. And now, we are including a free Chromebook with the purchase of select Linux Foundation instructor-led training courses to help you get the most out of your training experience.

Learn More