Linux Security

  • Model: LFS416
  • 9999 Units in Stock

$2,950.00

Add to Cart:

Linux Security

Security is always a concern, and with major security holes like Shellshock and Heartbleed being announced regularly, it’s more critical than ever to secure the data you are liable for. This course will walk you through the many risks and threats that exist, show you how to use best practices and other open-source tools to mitigate or counteract those threats, and teach you what you need to know to detect and recover from those attacks that do happen.

  • Introduction
  • Linux Foundation
  • Linux Foundation Training
  • Linux Foundation Certifications
  • Laboratory Exercises, Solutions and Resources
  • E-Learning Course: LFS216
  • Distribution Details
  • Labs
  • Security Basics
  • What is Security?
  • Assessment
  • Prevention
  • Detection
  • Reaction
  • Labs
  • Threats and Risk Assessment
  • Classes of Attackers
  • Types of Attacks
  • Trade Offs
  • Labs
  • Physical Access
  • Physical Security
  • Hardware Security
  • Understanding the Linux Boot Process
  • Labs
  • Logging
  • Logging Overview
  • Syslog Services
  • The Linux Kernel Audit Daemon
  • Linux Firewall Logging
  • Log Reports
  • Labs
  • Auditing and Detection
  • Auditing Basics
  • Understanding an Attack Progression
  • Detecting an Attack
  • Intrusion Detection Systems
  • Labs
  • Application Security
  • Bugs and Tools
  • Tracking and Documenting Changes
  • Resource Access Control
  • Mitigation Techniques
  • Policy Based Access Control Frameworks
  • Real World Example
  • Labs
  • Kernel Vulnerabilities
  • Kernel and User Spaces
  • Bugs
  • Mitigating Kernel Vulnerabilities
  • Vulnerabilities Examples
  • Labs
  • Authentication
  • Encryption and Authentication
  • Passwords and PAM
  • Hardware Tokens
  • Biometric Authentication
  • Network and Centralized Authentication
  • Labs
  • Local System Security
  • Standard UNIX Permissions
  • Administrator Account
  • Advanced UNIX Permissions
  • Filesystem Integrity
  • Filesystem Quotas
  • Labs
  • Network Security
  • TCP/IP Protocols Review
  • Remote Trust Vectors
  • Remote Exploits
  • Labs
  • Network Services Security
  • Network Tools
  • Databases
  • Web Server
  • File Servers
  • Labs
  • Denial of Service
  • Network Basics
  • DoS Methods
  • Mitigation Techniques
  • Labs
  • Remote Access
  • Unencrypted Protocols
  • Accessing Windows Systems
  • SSH
  • IPSEC VPNs
  • Labs
  • Firewalling and Packet Filtering
  • Firewalling Basics
  • iptables
  • Netfilter Implementation
  • Netfilter rule management
  • Mitigate Brute Force Login Attempts
  • Labs
  • Response and Mitigation
  • Preparation
  • During an Incident
  • Handling Incident Aftermath
  • Labs
  • Compliance testing with OSCAP
  • Compliance Testing
  • SCAP Introduction
  • OpenSCAP
  • SCAP Workbench
  • Command Line Scan
  • Labs

This product was added to our catalog on Thursday 31 January, 2019.

Important Links

Sponsors

Xpertech
Copyright © 2019 Chainbelow. Powered by Zen Cart
Develop Blockchains