By ComSystem Solutions
Linux™ Security & Hardening
By ComSystem Solutions
Request for In-house Training | Register for Public Training |
+603-5162-8254
+603-2201-4622 |
maler@comsystemsolutions.com
comsystem@comsystem . . . .com |
Linux Security & Hardening
Training Category:
Information Technology
Duration:
2 Days
Target Audience:
Candidates with security knowledge, IT technicians, system administrators etc.
Dec 2019 ›
ComSystem Solutions Training Centre, Wisma Goshen, Plaza Pantai, Kuala Lumpur, Malaysia
Schedule:
Thu 19 Dec 2019 - Fri 20 Dec 2019
9:00AM - 5:00PM
Fee Per Person:
RM1,650.00
Promotions:
- Register before 09 Dec 2019 for only RM1,450 per person.
- 20% Discount for the 2nd seat registration.
* Other terms & conditions apply.
Request for Quotation |
+603-5162-8254
+603-2201-4622 |
|
maler@comsystemsolutions.com
comsystem@comsystemsolutions.com |
- Language: English, Bahasa Malaysia
- Workshop
- Reading Materials
- Computer Lab Work
- Simulation
- Lecture
- Demonstrations
- Certificate of Participation
Course Introduction ›
This 2 days Linux security course will not only teach you the security concepts and guidelines that will keep your Linux servers safe, it will also walk you through step-by-step on the hardening measures and how to secure an enterprise Linux system that complies with the security policies. Many security policies and standards require system administrators to address specific user authentication concerns, system updates, auditing and logging, file system integrity, and more. Linux Server Hardening provides strategies for addressing specific security policy and configuration concerns.
Course Objectives ›
Some of what you will learn by taking this Linux Security and Hardening course:
- How to protect your Linux systems against hackers.
- Ways to prevent attackers from breaking into your systems, even when they have physical access to your machine.
- How to enforce strong password policies and control password as well as account aging policies on your Linux servers.
- SSH Hardening practices.
- Network security tactics.
- Port scanning and network service detection.
- How the Linux firewall works and exactly how to configure it.
- How to protect the superuser (root) account.
- Ways to share accounts securely with an audit trail.
- File system security and encryption.
- Using and configuring sudo, and why you need to.
- Advanced Linux permissions include special modes, file attributes, and access control lists (ACLs).
Prerequisites ›
Some IT security knowledge and experiences with Linux operating system.
Course Outline ›
Module 1 : General Security
- Is Linux Secure?
- What Makes Linux Secure?
- Security Guidelines and Principles
Module2 : Physical Security
- Physical Security Concepts
- Single User Mode Security
- Single User Mode and Blank Passwords
- Securing the Boot Loader
- Disk Encryption
- Encrypting a New Device
- Encrypting an Existing Device
- Disabling Control Alt Delete
Module 3: Account Security
- Intro to PAM
- Password Security
- Controlling Account Access
- Security by Account Type
Module 4: Network Security
- Network Security
- Securing SSHD
- Linux Firewall Fundamentals
- Configuring the Firewall from the Command Line
- Firewall Rule Specifications
- Linux Firewall Demonstration
Module 5: File System Security
- File and Directory Permissions
- Special Modes
- File Attributes
- ACLs
- Rootkits
- Rootkit Detection Software
- Linux Hardening Guides
Contact us now ›
|
|
Call : +603-5162-8254, +603-2201-4622 |
E-mail : maler@comsystemsolutions.com, comsystem@comsystemsolutions.com |