Linux Security (LFS416)
Seminarinformationen
Seminar - Ziel
In this course you will learn how to assess security risks in your enterprise Linux environment, the best techniques and tools to increase security, server hardening, how to deploy and use monitoring and attack detection tools, how to gain visibility into possible vulnerabilities, the art and science of developing your Linux security policy and response strategy, how to configure your systems for compliance with HIPAA, DISA STIG, etc., and more.
Teilnehmer - Zielgruppe
This course is for individuals already experienced in Linux system administration who want to improve their security posture. Before enrolling, you should have a solid understanding of core local system administration and networking concepts, and be experienced with Linux (or more generally UNIX), especially at the command line level.
Kurs - Voraussetzungen
To make the most of of this course, you should:
- Have a solid understanding of core local system administration and networking concepts equivalent to that obtained from LFS301 Linux System Administration and LFS311 Linux Networking and Administration.
- Be experienced with Linux (or more generally UNIX), especially at the command line level.
Seminardauer
- 4 Tage
- 09:00 Uhr bis 17:00 Uhr
Schulungsunterlagen
Seminar-Inhalt / Agenda
Introduction
- Linux Foundation
- Linux Foundation Training
- Linux Foundation Certifications
- Linux Foundation Digital Badges
- Laboratory Exercises, Solutions and Resources
- E-Learning Course: LFS216
- Distribution Details
- Labs
- Security Basics
What is Security?
- Assessment
- Prevention
- Detection
- Reaction
- Labs
- Threats and Risk Assessment
Classes of Attackers
- Types of Attacks
- Trade Offs
- Labs
- Physical Access
Physical Security
- Hardware Security
- Understanding the Linux Boot Process
- Labs
- Logging
Logging Overview
- Syslog Services
- journald Services
- The Linux Kernel Audit Daemon
- Linux Firewall Logging
- Log Reports
- Labs
- Auditing and Detection
Auditing Basics
- Understanding an Attack Progression
- Detecting an Attack
- Intrusion Detection Systems
- Labs
- Application Security
Bugs and Tools
- Tracking and Documenting Changes
- Resource Access Control
- Mitigation Techniques
- Policy Based Access Control Frameworks
- Real World Example
- Labs
- Kernel Vulnerabilities
Kernel and User Spaces
- Bugs
- Mitigating Kernel Vulnerabilities
- Vulnerabilities Examples
- Labs
- Authentication
Encryption and Authentication
- Passwords and PAM
- Hardware Tokens
- Biometric Authentication
- Network and Centralized Authentication
- Labs
- Local System Security
Standard UNIX Permissions
- Administrator Account
- Advanced UNIX Permissions
- Filesystem Integrity
- Filesystem Quotas
- Labs
- Network Security
TCP/IP Protocols Review
- Remote Trust Vectors
- Remote Exploits
- Labs
- Network Services Security
Network Tools
- Databases
- Web Server
- File Servers
- Labs
- Denial of Service
Network Basics
- DoS Methods
- Mitigation Techniques
- Labs
- Remote Access
Unencrypted Protocols
- Accessing Windows Systems
- SSH
- IPSEC VPNs
- Labs
- Firewalling and Packet Filtering
Firewalling Basics
- iptables
- Netfilter Implementation
- Netfilter rule management
- Mitigate Brute Force Login Attempts
- nft Concepts
- Labs
- Response and Mitigation
Preparation
- During an Incident
- Handling Incident Aftermath
- Labs
- Compliance testing with OSCAP
Compliance Testing
- SCAP Introduction
- OpenSCAP
- SCAP Workbench
- Command Line Scan
- Labs
Closing and EvaluAation Survey
Weitere Schulungen zu Thema Linux Foundation
- u.a. in Nürnberg, Berlin, Stuttgart, München, KölnThis course will teach you how to containerize, host, deploy, and configure an application in a multi-node cluster. It also serves as preparation for the Certified Kubernetes Application Developer (CKAD) exam. Starting with a simple Python script, this course will show you how ...
- u.a. in Nürnberg, Berlin, Stuttgart, München, KölnIn this course you will learn about installation of a multi-node Kubernetes cluster using kubeadm, and how to grow a cluster, choosing and implementing cluster networking, and various methods of application lifecycle management, including scaling, updates and roll-backs. The ...
- u.a. in Hamburg, Leipzig, Essen, Mannheim, DarmstadtThis instructor-led course focuses on the important tools used for debugging and monitoring the kernel, and how security features are implemented and controlled. This four day course includes extensive hands-on exercises and demonstrations designed to give you the necessary ...
- u.a. in Frankfurt am Main, Hannover, Stuttgart, Düsseldorf, FreiburgIn this course you will learn about the history of Linux and what differentiates it from other UNIX-like operating systems, what the main ingredients of a Linux system are and how to use them, the essentials of system administration, such as user accounts and groups, essential ...