Linux Security (LFS416) Training

Upcoming Instructor Led Online and Public Linux Security (LFS416) classes
Linux Security (LFS416) 8 April, 2019 - 11 April, 2019 $2600 Hartmann Software Group Training Registration
Linux Security (LFS416) 15 July, 2019 - 18 July, 2019 $2600 Hartmann Software Group Training Registration

Answers to Popular Questions:

Yes, this class can be tailored to meet your specific training needs.
Yes, we provide Linux Unix consulting services.
Yes, group discounts are provided.

Course Description

This advanced, completely hands-on course adopts a highly technical approach to cover important security techniques and tools. By providing visibility both into attack vectors and possible security holes, this course provides you a complete guide on how to mitigate security risks in any Linux environment. You will get direct experience with: Assessing security risks in your enterprise Linux environment. The best techniques and tools to increase security. Server hardening Deploying monitoring and attack detection tools. Gaining visibility into possible vulnerabilities. Developing your Linux security policy and response strategy. Configuring your systems for compliance with HIPAA, DISA STIG, etc. And more.
Course Length: 4 Days
Course Tuition: $2600 (US)


Attendees should: Have a solid understanding of core local system administration and networking concepts and be experienced with Linux (or more generally UNIX), especially at the command line level.

Course Outline

Linux Foundation
Linux Foundation Training
Introduction to Security
What is Security
Threats and Risk Assessment
Types of Attacks
Trade Offs
Physical Access
Physical Security
Hardware Security
Understanding the Linux Boot Process
Logging Overview
Syslog Services
The Linux Kernel Audit Daemon
Linux Firewall Logging
Log Reports
Auditing and Detection
Auditing Basics
Understanding an Attack Progression
Detecting an Attack
Intrusion Detection Systems
Application Security
Bugs, Beetles, and More
Tracking and Documenting Changes
Resource Access Control
Mitigation Techniques
Policy Based Access Control Frameworks
Real World Example
Kernel Vulnerabilities
Kernel and User Spaces
Mitigating Kernel Vulnerabilities
Vulnerabilities Examples
Encryption and Authentication
Hardware Tokens
Biometric Authentication
Network and Centralized Authentication
Local System Security
Standard UNIX Permissions
Administrator Account
Advanced UNIX Permissions
Filesystem Integrity
Filesystem Quotas
Network Security
TCP/IP Protocols Review
Remote Trust Vectors
Remote Exploits
Network Services Security
Network Tools
Web Server
File Servers
Denial of Service
Network Basics
DoS Methods
Mitigation Techniques
Remote Access
Unencrypted Protocols
Accessing Windows Systems
Firewalling and Packet Filtering
Firewalling Basics
Netfilter (IPTables)
Netfilter Implementation
Mitigate Brute Force Login Attempts
Response and Mitigation
During an Incident
Handling Incident Aftermath

Course Directory [training on all levels]

Upcoming Classes
Gain insight and ideas from students with different perspectives and experiences.

Interesting Reads Take a class with us and receive a book of your choosing for 50% off MSRP.