Linux Security (LFS416)

This advanced, hands-on course uses a highly technical approach to cover all important techniques and tools that should be put into practice in an enterprise Linux environment. By providing visibility both into attack vectors and possible security holes, this course provides a complete guide on how to mitigate security risks in any Linux environment.


Audience

Any professional IT manager and administrator should benefit from this course. Software developers who need to improve their knowledge of security concepts and strategies will also find a great deal of information that applies to their responsibilities.

 

Prerequisites

Have a good understanding of core local system administration and networking concepts is a definite requirement for this class. Have experience with Linux or UNIX also expected, especially at the command line level.

Details anzeigen


Course Outline

1.Security Concepts

  •  Overview
  • Security As A Process
  • Security In Depth
  • Three Core Principles
  • Best Practices
  • Cryptography

 

2.Threats \& Risk Assessment

  • Overview
  • Risk Assessment
  • Attackers
  • Kinds Of Attacks
  • Summary

 

3.Physical Access

  • Overview
  • Boot Sequence
  • Common Attacks
  • Removable Media
  • Cryptography
  • Summary

 

4.Kernel Vulnerabilities

  • Overview
  • Concepts
  • Bugs
  • Mitigation

 

5.Application Vulnerabilities

  • Overview
  • Concepts
  • Features
  • Historical

 

6.Denial Of Service

  • Overview
  • Concepts
  • Local Attacks
  • Remote Attacks
  • Historical Examples

 

7.Local Authentication

  • Overview
  • Passwords
  • Hardware Tokens
  • Summary

 

8.Remote Authentication

  • Overview
  • Passwords
  • Public Key Cryptography
  • One Time Pads
  • Distributed Authentication

 

9.Local System Security

  • Overview
  • Standard Unix Permissions
  • Advanced Unix Permissions
  • Summary

 

10.Network Security

  • Overview
  • Kernel Tuning
  • Remote Exploits
  • Remote Trust

 

11.Remote Access

  •  Overview
  • Bad Protocols
  • SSH
  • Tunneling
  • Virtual Private Networking
  • IPv6

 

12.Packet Filtering

  • Overview
  • Protocol Overview
  • Packet Filtering
  • Packet Filtering in Linux
  • Tables
  • The Filter Table
  • The NAT Table
  • The Mangle Table
  • Targets
  • State
  • LOGGING
  • Network Address Translation

 

13.Network Security

  • Overview
  • Kernel Tuning
  • Remote Exploits
  • Remote Trust
  • Summary

 

14.Security Tools Overview

  •  Overview
  • Summary

 

15.Logging

  • Overview
  • Summary

 

16.Auditing \& Detection

  •  Overview
  • Vulnerability Detection
  • Intrusion Detection
  • Summary

 

17.Response \& Mitigation

  • Overview
  • Policy
  • Escalation
  • Summary