Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Introduction
- Linux Foundation Overview
- Linux Foundation Training Programs for Government
- Linux Foundation Certifications for Government Professionals
- Digital Badges from the Linux Foundation
- Laboratory Exercises, Solutions, and Resources for Government
- E-Learning Course: LFS216 for Government
- Distribution Details for Government Systems
- Laboratory Sessions for Hands-On Learning
- Security Basics for Government IT Systems
What is Security?
- Risk Assessment Techniques
- Preventive Measures in Government IT
- Detection Methods and Tools
- Reaction Protocols for Incident Response
- Laboratory Sessions on Security Fundamentals
- Threats and Risk Assessment for Government Systems
Classes of Attackers
- Types of Cyber Attacks Relevant to Government
- Trade-Offs in Security Measures
- Laboratory Sessions on Identifying Attackers
- Physical Access Control for Government Facilities
Physical Security
- Hardware Security for Government Systems
- Understanding the Linux Boot Process in a Government Context
- Laboratory Sessions on Physical Security Measures
- Logging and Monitoring Physical Access
Logging Overview
- Syslog Services for Government IT
- journald Services in Government Systems
- The Linux Kernel Audit Daemon for Enhanced Security
- Linux Firewall Logging for Threat Detection
- Log Reports and Analysis for Incident Response
- Laboratory Sessions on Logging Techniques
- Auditing and Detection for Government IT Operations
Auditing Basics
- Understanding Attack Progression in Government Systems
- Detecting Attacks through Auditing
- Intrusion Detection Systems (IDS) for Government
- Laboratory Sessions on Auditing and IDS
- Application Security for Government Software
Bugs and Tools
- Tracking and Documenting Changes in Government IT Systems
- Resource Access Control for Secure Operations
- Mitigation Techniques for Common Vulnerabilities
- Policy-Based Access Control Frameworks for Government
- Real-World Example of Security Implementation
- Laboratory Sessions on Bug Identification and Mitigation
- Kernel Vulnerabilities and Their Impact on Government Systems
Kernel and User Spaces
- Bugs in the Kernel and User Space
- Mitigating Kernel Vulnerabilities for Government IT
- Vulnerability Examples and Case Studies
- Laboratory Sessions on Kernel Security
- Authentication Methods for Secure Access
Encryption and Authentication
- Passwords and PAM (Pluggable Authentication Modules) for Government Systems
- Hardware Tokens for Enhanced Security
- Biometric Authentication in Government IT
- Network and Centralized Authentication Protocols
- Laboratory Sessions on Encryption and Authentication Techniques
- Local System Security Measures for Government
Standard UNIX Permissions
- Administrator Account Management in Government IT
- Advanced UNIX Permissions for Secure File Handling
- Filesystem Integrity Checking for Government Systems
- Filesystem Quotas for Resource Management
- Laboratory Sessions on UNIX Permissions and Security
- Network Security for Government Networks
TCP/IP Protocols Review
- Remote Trust Vectors in Government IT Systems
- Remote Exploit Prevention Techniques
- Laboratory Sessions on TCP/IP Protocol Analysis
- Network Services Security for Government Applications
Network Tools
- Databases and Their Role in Network Security
- Web Server Security for Government Websites
- File Server Security Measures
- Laboratory Sessions on Network Tool Usage
- Denial of Service (DoS) Attacks and Mitigation
Network Basics
- DoS Methods and Techniques for Government Networks
- Mitigation Strategies for DoS Attacks
- Laboratory Sessions on Network Security Fundamentals
- Remote Access Solutions for Secure Government Operations
Unencrypted Protocols
- Accessing Windows Systems from Linux Environments
- Secure Shell (SSH) for Remote Connections
- IPSEC Virtual Private Networks (VPNs) for Secure Communication
- Laboratory Sessions on Unencrypted Protocol Security
- Firewalling and Packet Filtering Techniques for Government IT
Firewalling Basics
- iptables Configuration for Government Firewalls
- Netfilter Implementation in Government Systems
- Netfilter Rule Management for Enhanced Security
- Mitigating Brute Force Login Attempts in Government IT
- nft Concepts and Usage for Government Networks
- Laboratory Sessions on Firewalling Techniques
- Response and Mitigation Strategies for Cyber Incidents
Preparation
- Incident Response During a Security Breach
- Handling the Aftermath of a Cyber Incident
- Laboratory Sessions on Incident Preparation and Response
- Compliance Testing with OSCAP for Government Systems
Compliance Testing
- Introduction to Security Content Automation Protocol (SCAP)
- OpenSCAP for Automated Compliance Checking
- SCAP Workbench for User-Friendly Compliance Testing
- Command Line Scan Techniques for Compliance Verification
- Laboratory Sessions on SCAP and OpenSCAP Usage
Requirements
To fully benefit from this course, participants should:
- Possess a strong foundation in core local system administration and networking concepts, comparable to the knowledge gained from LFS301 Linux System Administration and LFS311 Linux Networking and Administration.
- Have substantial experience with Linux (or more generally UNIX), particularly at the command line level.
Audience:
This course is designed for individuals already proficient in Linux system administration who seek to enhance their security practices. Before enrolling, participants should have a solid understanding of core local system administration and networking concepts and be experienced with Linux (or more generally UNIX), especially at the command line level.
Experience Level: Intermediate
This course is tailored for government professionals looking to improve their cybersecurity skills in alignment with public sector workflows, governance, and accountability.
28 Hours