Linux Security & Hardening Course

Linux Security & Hardening Training Course Linux Security & Hardening Course
By ComSystem Solutions
System Security:

Linux Security & Hardening

“Keep your company’s Linux systems out of hackers, crackers, and attackers!”

By ComSystem Solutions


PSMB Certified Training Provider • Comptia Authorized Delivery Partner • Pearson Vue Certified Test Centre • Registered with Ministry of Finance
Request for In-house TrainingRequest for In-house Training
Register for Public Training Public program not yet available
Register for Public TrainingRegister for Public Training
Contact Customer Service +603-5162-8254
+603-2201-4622
Email Customer Service [email protected]
[email protected] . . . .com
Course Title:
Linux Security & Hardening
Training Category:
Information Technology
Target Audience:
Candidates with security knowledge, IT technicians, system administrators etc.
Duration:
2 Days
Public Training Events
Feb 2017 ›
Venue:
ComSystem Solutions Training Centre, Wisma Goshen, Plaza Pantai, Kuala Lumpur, Malaysia
Schedule:
Thu 16 Feb 2017 - Fri 17 Feb 2017
9:00AM - 5:00PM

Fee Per Person:
RM1,650.00
Promotions:
  • Register before 6 Feb 2017 for only RM1,450 per person.
  • Register for 3 persons for a total fee of 2 persons.
  • 20% discount for group registration of 2 paxs.
Register Now!

* Other terms & conditions apply.
For In-house Training
Request for Quotation Request for Quotation
For Other Inquiries
Contact ComSystem Solutions
Contact customer service +603-5162-8254
+603-2201-4622
Email customer service [email protected]
[email protected]
Delivery Methods
  • Language: English, Bahasa Malaysia
  • Workshop
  • Reading Materials
  • Computer Lab Work
  • Simulation
  • Lecture
  • Demonstrations
  • Certificate of Participation
Ad by Google
*Terms & Conditions

Course Introduction ›

This 2 days Linux security course will not only teach you the security concepts and guidelines that will keep your Linux servers safe, it will also walk you through step-by-step on the hardening measures and how to secure an enterprise Linux system that complies with the security policies. Many security policies and standards require system administrators to address specific user authentication concerns, system updates, auditing and logging, file system integrity, and more. Linux Server Hardening provides strategies for addressing specific security policy and configuration concerns.

Course Objectives ›

Some of what you will learn by taking this Linux Security and Hardening course:

  • How to protect your Linux systems against hackers.
  • Ways to prevent attackers from breaking into your systems, even when they have physical access to your machine.
  • How to enforce strong password policies and control password as well as account aging policies on your Linux servers.
  • SSH Hardening practices.
  • Network security tactics.
  • Port scanning and network service detection.
  • How the Linux firewall works and exactly how to configure it.
  • How to protect the superuser (root) account.
  • Ways to share accounts securely with an audit trail.
  • File system security and encryption.
  • Using and configuring sudo, and why you need to.
  • Advanced Linux permissions include special modes, file attributes, and access control lists (ACLs).

Prerequisites ›

Some IT security knowledge and experiences with Linux operating system.

Course Outline ›

DAY 1

Module 1 : General Security

  • Is Linux Secure?
  • What Makes Linux Secure?
  • Security Guidelines and Principles

Module2 : Physical Security

  • Physical Security Concepts
  • Single User Mode Security
  • Single User Mode and Blank Passwords
  • Securing the Boot Loader
  • Disk Encryption
  • Encrypting a New Device
  • Encrypting an Existing Device
  • Disabling Control Alt Delete

Module 3: Account Security

  • Intro to PAM
  • Password Security
  • Controlling Account Access
  • Security by Account Type
DAY 2

Module 4: Network Security

  • Network Security
  • Securing SSHD
  • Linux Firewall Fundamentals
  • Configuring the Firewall from the Command Line
  • Firewall Rule Specifications
  • Linux Firewall Demonstration

Module 5: File System Security

  • File and Directory Permissions
  • Special Modes
  • File Attributes
  • ACLs
  • Rootkits
  • Rootkit Detection Software
  • Linux Hardening Guides

Contact us now ›

  • Course content customization
  • In-house training request
  • Available public program
  • Consultation services
  • Other inquiries
Contact Customer ServiceCall : +603-5162-8254, +603-2201-4622
Email Customer Service E-mail : [email protected], [email protected]

Related Courses ›

Published by: ,