Linux Security (LFS416)

Overview

This advanced, hands-on course uses a highly technical approach to cover all important techniques and tools that should be put into practice in an enterprise Linux environment. By providing visibility both into attack vectors and possible security holes, this course provides a complete guide on how to mitigate security risks in any Linux environment.

Audience
 
Any professional IT manager and administrator should benefit from this course. Software developers who need to improve their knowledge of security concepts and strategies will also find a great deal of information that applies to their responsibilities.
 
Prerequisites
 
Have a good understanding of core local system administration and networking concepts is a definite requirement for this class. Have experience with Linux or UNIX also expected, especially at the command line level.
 
Mostrar detalhes
Course Outline

1.Security Concepts
 
  • Overview
  • Security As A Process
  • Security In Depth
  • Three Core Principles
  • Best Practices
  • Cryptography
 
2.Threats \& Risk Assessment
 
  • Overview
  • Risk Assessment
  • Attackers
  • Kinds Of Attacks
  • Summary
 
3.Physical Access
 
  • Overview
  • Boot Sequence
  • Common Attacks
  • Removable Media
  • Cryptography
  • Summary
 
4.Kernel Vulnerabilities
 
  • Overview
  • Concepts
  • Bugs
  • Mitigation
 
5.Application Vulnerabilities
 
  • Overview
  • Concepts
  • Features
  • Historical
 
6.Denial Of Service
 
  • Overview
  • Concepts
  • Local Attacks
  • Remote Attacks
  • Historical Examples
 
7.Local Authentication
 
  • Overview
  • Passwords
  • Hardware Tokens
  • Summary
 
8.Remote Authentication
 
  • Overview
  • Passwords
  • Public Key Cryptography
  • One Time Pads
  • Distributed Authentication
 
9.Local System Security
 
  • Overview
  • Standard Unix Permissions
  • Advanced Unix Permissions
  • Summary
 
10.Network Security
 
  • Overview
  • Kernel Tuning
  • Remote Exploits
  • Remote Trust
 
11.Remote Access
 
  • Overview
  • Bad Protocols
  • SSH
  • Tunneling
  • Virtual Private Networking
  • IPv6
 
12.Packet Filtering
 
  • Overview
  • Protocol Overview
  • Packet Filtering
  • Packet Filtering in Linux
  • Tables
  • The Filter Table
  • The NAT Table
  • The Mangle Table
  • Targets
  • State
  • LOGGING
  • Network Address Translation
 
13.Network Security
 
  • Overview
  • Kernel Tuning
  • Remote Exploits
  • Remote Trust
  • Summary
 
14.Security Tools Overview
 
  • Overview
  • Summary
 
15.Logging
 
  • Overview
  • Summary
 
16.Auditing \& Detection
 
  • Overview
  • Vulnerability Detection
  • Intrusion Detection
  • Summary
 
17.Response \& Mitigation
 
  • Overview
  • Policy
  • Escalation
  • Summary