Course Outline

Introduction

  • Linux Foundation
  • Linux Foundation Training for Government
  • Linux Foundation Certifications
  • Linux Foundation Digital Badges
  • Laboratory Exercises, Solutions, and Resources
  • E-Learning Course: LFS216
  • Distribution Details
  • Labs
  • Security Basics

What is Security?

  • Assessment
  • Prevention
  • Detection
  • Reaction
  • Labs
  • Threats and Risk Assessment

Classes of Attackers

  • Types of Attacks
  • Trade-offs
  • Labs
  • Physical Access

Physical Security

  • Hardware Security
  • Understanding the Linux Boot Process
  • Labs
  • Logging

Logging Overview

  • Syslog Services
  • journald Services
  • The Linux Kernel Audit Daemon
  • Linux Firewall Logging
  • Log Reports
  • Labs
  • Auditing and Detection

Auditing Basics

  • Understanding an Attack Progression
  • Detecting an Attack
  • Intrusion Detection Systems
  • Labs
  • Application Security

Bugs and Tools

  • Tracking and Documenting Changes
  • Resource Access Control
  • Mitigation Techniques
  • Policy-Based Access Control Frameworks
  • Real-World Example
  • Labs
  • Kernel Vulnerabilities

Kernel and User Spaces

  • Bugs
  • Mitigating Kernel Vulnerabilities
  • Vulnerability Examples
  • Labs
  • Authentication

Encryption and Authentication

  • Passwords and PAM
  • Hardware Tokens
  • Biometric Authentication
  • Network and Centralized Authentication
  • Labs
  • Local System Security

Standard UNIX Permissions

  • Administrator Account
  • Advanced UNIX Permissions
  • Filesystem Integrity
  • Filesystem Quotas
  • Labs
  • Network Security

TCP/IP Protocols Review

  • Remote Trust Vectors
  • Remote Exploits
  • Labs
  • Network Services Security

Network Tools

  • Databases
  • Web Server
  • File Servers
  • Labs
  • Denial of Service

Network Basics

  • DoS Methods
  • Mitigation Techniques
  • Labs
  • Remote Access

Unencrypted Protocols

  • Accessing Windows Systems
  • SSH
  • IPSEC VPNs
  • Labs
  • Firewalling and Packet Filtering

Firewalling Basics

  • iptables
  • Netfilter Implementation
  • Netfilter Rule Management
  • Mitigate Brute Force Login Attempts
  • nft Concepts
  • Labs
  • Response and Mitigation

Preparation

  • During an Incident
  • Handling Incident Aftermath
  • Labs
  • Compliance Testing with OSCAP

Compliance Testing

  • SCAP Introduction
  • OpenSCAP
  • SCAP Workbench
  • Command Line Scan
  • Labs

Requirements

To fully benefit from this course, participants should:

  • Possess a strong foundation in core local system administration and networking concepts, equivalent to the knowledge gained from LFS301 Linux System Administration and LFS311 Linux Networking and Administration.
  • Have substantial experience with Linux (or more generally UNIX), particularly at the command line level.

Audience

This course is designed for individuals who are already proficient in Linux system administration and seek to enhance their security practices. Before enrolling, participants should have a solid understanding of core local system administration and networking concepts and be experienced with Linux (or more generally UNIX), especially at the command line level.

Experience Level: Intermediate

This course is tailored for government professionals looking to strengthen their cybersecurity capabilities.
 28 Hours

Number of participants


Price per participant

Upcoming Courses

Related Categories