Linux Security & Hardening Course

Linux Security & Hardening Training Course Linux Security & Hardening Course
By ComSystem Solutions
System Security:

Linux Security & Hardening

Course Title:
Linux Security & Hardening
Training Category:
Information Technology
Target Audience:
Candidates with security knowledge, IT technicians, system administrators etc.
Duration:
2 Days
Public Training Events
Feb 2017 ›
Venue:
ComSystem Solutions Training Centre, Wisma Goshen, Plaza Pantai, Kuala Lumpur, Malaysia
Schedule:
Thu 16 Feb 2017 - Fri 17 Feb 2017
9:00AM - 5:00PM

Fee Per Person:
RM1,650.00
Promotions:
  • Register before 6 Feb 2017 for only RM1,450 per person.
  • Register for 3 persons for a total fee of 2 persons.
  • 20% discount for group registration of 2 paxs.
Register Now!

* Other terms & conditions apply.

Course Introduction ›

This 2 days Linux security course will not only teach you the security concepts and guidelines that will keep your Linux servers safe, it will also walk you through step-by-step on the hardening measures and how to secure an enterprise Linux system that complies with the security policies. Many security policies and standards require system administrators to address specific user authentication concerns, system updates, auditing and logging, file system integrity, and more. Linux Server Hardening provides strategies for addressing specific security policy and configuration concerns.

Course Objectives ›

Some of what you will learn by taking this Linux Security and Hardening course:

  • How to protect your Linux systems against hackers.
  • Ways to prevent attackers from breaking into your systems, even when they have physical access to your machine.
  • How to enforce strong password policies and control password as well as account aging policies on your Linux servers.
  • SSH Hardening practices.
  • Network security tactics.
  • Port scanning and network service detection.
  • How the Linux firewall works and exactly how to configure it.
  • How to protect the superuser (root) account.
  • Ways to share accounts securely with an audit trail.
  • File system security and encryption.
  • Using and configuring sudo, and why you need to.
  • Advanced Linux permissions include special modes, file attributes, and access control lists (ACLs).

Prerequisites ›

Some IT security knowledge and experiences with Linux operating system.

Course Outline ›

DAY 1

Module 1 : General Security

  • Is Linux Secure?
  • What Makes Linux Secure?
  • Security Guidelines and Principles

Module2 : Physical Security

  • Physical Security Concepts
  • Single User Mode Security
  • Single User Mode and Blank Passwords
  • Securing the Boot Loader
  • Disk Encryption
  • Encrypting a New Device
  • Encrypting an Existing Device
  • Disabling Control Alt Delete

Module 3: Account Security

  • Intro to PAM
  • Password Security
  • Controlling Account Access
  • Security by Account Type
DAY 2

Module 4: Network Security

  • Network Security
  • Securing SSHD
  • Linux Firewall Fundamentals
  • Configuring the Firewall from the Command Line
  • Firewall Rule Specifications
  • Linux Firewall Demonstration

Module 5: File System Security

  • File and Directory Permissions
  • Special Modes
  • File Attributes
  • ACLs
  • Rootkits
  • Rootkit Detection Software
  • Linux Hardening Guides

Contact us now ›

  • Course content customization
  • In-house training request
  • Available public program
  • Consultation services
  • Other inquiries
Contact Customer ServiceCall : +603-5162-8254, +603-2201-4622
Email Customer Service E-mail : [email protected], [email protected]

Related Courses ›

Published by: ,