0345 4506120

Linux System Security

Course Details

Name Linux System Security
Description
URL
Location:
London - City
Start Date:
Working Days:
Price:
£1849.00 +vat
was £1999.00
Availability:
Exam:
Residential:
Course ID:
471048
Offer

Overview

This highly practical instructor Linux System Security course is aimed at Linux System Administrators who wish to enhance their knowledge  of Linux security and increase the security of their Linux systems.

The course is designed to teach security related tasks that would be relevant for all Linux distributions. For the purpose of practical exercises, CentOS Linux  will be used.

Exercises and examples are used throughout the course to give practical hands-on experience with the techniques covered.

Who will the Course Benefit?

The Linux System Security course is aimed at Linux System Administrators who wish to expand their knowledge of the many Linux security features and  increase the security level of their Linux systems.

Learning Objectives

This course aims to provide the delegate with the knowledge to be able to query their Linux system for most security related events and harden many aspects of their  system. The course explains the; Linux logging and auditing framework, SELinux, the firewall, certificate authorities, network time, Secure Shell, Pluggable  Authentication Modules, host intrusion and detection, password cracking, the sudo command, encrypting files and OpenVPN.

The delegate will gain an understanding of:

  • Linux security basics, precautions and common attack methods
  • Viewing and configuring the key Linux log files
  • Querying and configuring the Linux Audit Framework
  • Knowledge and execution of key SELinux commands
  • Modifying SELinux policy and policy modules
  • Configuring the Red Hat firewall
  • Securing Linux applications with certificates
  • Securing applications with TCP wrappers
  • Securing SSH
  • Installing and configuring a Host Intrusion Detection System
  • Detecting root kits, viruses and other malware
  • Identifying security updates and signing packages
  • Increasing system security with PAM
  • Installing and configuring a password cracking utility
  • Basic and advanced sudo configuration
  • Securing Linux logins
  • Enchancing filesystem security and encrypting files
  • Configuring enhanced permissions and Access Control Lists
  • Configuring an OpenVPN server and client

Pre-Requisites

Requirements

Delegates attending this course should have experience of administering Linux in an Enterprise environment to the level covered in the pre-requisite courses. The requirements for this course can be met by any one of the pre-requisite courses listed.

Pre-Requisite Courses

  • Administering Red Hat Linux 7 - Part
  • Linux System Administration (LPI & CompTIA
  • SUSE Linux System Administratio
  • Oracle Linux 7 Administration

Follow-On Courses

  • Administering Red Hat Linux 7 - Part
  • Linux Advanced System Administration (LPI
  • SUSE Linux Advanced System Administratio
  • Oracle Linux 7 Advanced Administration

Notes:

  • Course technical content is subject to change without notice.
  • Course content is structured as sessions, this does not strictly map to course timings. Concepts, content and practicals often span sessions.

Course Content

Course Contents - DAY 1

Course Introduction

  • Administration and Course Materials
  • Course Structure and Agenda
  • Delegate and Trainer Introductions

Session 1: INTRODUCTION TO LINUX SECURITY

  • Linux Native Security
  • Areas of Security
  • Common Attack Methods
  • Basic Security Precautions
  • Standards and Compliance

Session 2: SECURING THE USER ENVIRONMENT

  • Managing User Accounts
  • Bash history
  • Configuring History
  • Confining User History

Session 3: LOGGING WITHIN LINUX

  • Linux Log Files
  • systemd Journal
  • Linux Audit Framework
  • Generating Audit Queries
  • Configuring Auditing
  • Defining Auditing Rules

Session 4: SELinux

  • DAC vs MAC
  • The SELinux Policy
  • SELinux Contexts
  • SELinux Key Commands
  • Viewing SELinux Decisions
  • SELinux Booleans
  • Exporting SELinux Configuration

Course Contents - DAY 2

Session 5: SELinux MODULES

  • SELinux Entities
  • SELinux Modules
  • Administering Modules
  • Creating Modules With audit2allow
  • Writing SELinux Modules
  • The Type Enforcement File

Session 6: RED HAT FIREWALL

  • Firewalld Overview
  • Firewalld vs IPTables
  • Firewall Zones
  • Configuring Firewall
  • Creating a Firewall Service
  • Configuring Firewall Zones
  • Rich Rules
  • Fail2ban Installation and Configuration

Session 7: SECURING SSH

  • Key Algorithms
  • SSH Agents
  • SSH Server Options
  • The known_hosts File
  • Certificate Based Authentication
  • Verifying Signed Certificates

Session 8: SECURING APPLICATIONS

  • Certificate Based Authentication
  • Creating a Certificate Authority
  • Configuring Logging with TLS
  • TCP Wrappers
  • Network Time
  • chrony Security
  • Authenticating chrony Clients

Course Contents - DAY 3

Session 9: INTRUSION DETECTION AND PREVENTION

  • Detecting Intrusions with AIDE
  • Installing and Configuring AIDE
  • Detecting and Removing Rootkits
  • Installing and Configuring ClamAV

Session 10: SECURING PACKAGES

  • Red Hat Package Management
  • Obtaining Detailed Update Information
  • Package Management History
  • Creating an rpm Package
  • Signing an rpm Package
  • Installing a Signed rpm
  • Creating a Package Repository

Session 11: PLUGGABLE AUTHENTICATION MODULES

  • PAM File Format
  • PAM Configuration File
  • Using PAM to Allow/Deny a Service
  • Restricting Access to SSH
  • Increasing Password Complexity
  • Delaying Failed Logins
  • Controlling Access by Time
  • Limiting user Resources

Session 12: CRACKING LINUX PASSWORDS

  • Password Hashing Methods
  • Verifying Password Strength
  • Types Of Password Attacks
  • Password Cracking
  • Installing a Password Cracking Utility
  • Installing a Word List
  • Resetting a Lost root Password

Course Contents - DAY 4

Session 13: SUDO AND RESTRICTING LOGINS

  • Configuring Sudo
  • Basic Examples
  • Password Administration
  • Running Sudo On Remote Systems
  • Sudoedit
  • Sudo Logging
  • Sudo Digests
  • Include Statements
  • Restricting root Access

Session 14: SECURING THE LINUX FILESYSTEM

  • Linux Filesystem Security
  • Protecting the Boot Menu
  • Securely Erasing Data
  • Data Sanitisation Methods
  • Extended Permissions
  • Extended File Attributes
  • File Access Control Lists
  • LUKS Encrypted Partitions

Session 15: AN OVERVIEW OF RED HAT IDENTITY MANAGEMENT

  • Red Hat Identity Management
  • The Identity Management Domainli> oprah i deepak robia znowy 21 dni darmowej medytacji
  • IdM Server Configuration Options

APPENDIX A - IdM INSTALLATION

  • IdM Server Prerequisites
  • Verifying DNS Configuration
  • IdM Server Installation
  • IdM Client Installation

APPENDIX B - SECURING VSFTPD WITH SSL/TLS

  • Creating an SSL Certificate
  • Configuring VSFTPD FOR SSL/TLS

London - Barbican

Location:

Barbican Training Centre
6 Long Lane
London
EC1A 9HF

 

Directions:

By Rail

Farringdon Main Line Station is within walking distance of the Training premises.  Turn left outside the station and follow Cowcross Street to the end. Turn left into Charterhouse Street.  Turn right into Hayne Street and then left into Long Lane.  The Training premises are situated 200 yards on the left-hand side of the road.

By Tube


Barbican Station is on the Circle, Metropolitan and Hammersmith & City Lines.  Turn right out of the station and then right into Long Lane.  The Training premises are 50 yards on the right hand side of the road.

By Road

Barbican is situated on the main A1 road. An NCP Car Park is located in the Barbican Centre.  The cost is approximately £16 per day.

Entry

To gain entry on arrival, press the intercom button.  Take the lift to the 3rd floor, go through the doors on the right and report to Reception.

Our Customers Include