Linux Security (LFS416) Training

Answers to Popular Questions:

 
Yes, this class can be tailored to meet your specific training needs.
Yes, we provide Linux Unix consulting services.
Yes, group discounts are provided.

Course Description

 
This advanced, completely hands-on course adopts a highly technical approach to cover important security techniques and tools. By providing visibility both into attack vectors and possible security holes, this course provides you a complete guide on how to mitigate security risks in any Linux environment. You will get direct experience with: Assessing security risks in your enterprise Linux environment. The best techniques and tools to increase security. Server hardening Deploying monitoring and attack detection tools. Gaining visibility into possible vulnerabilities. Developing your Linux security policy and response strategy. Configuring your systems for compliance with HIPAA, DISA STIG, etc. And more.
Course Length: 4 Days
Course Tuition: $2200 (US)

Prerequisites

Attendees should: Have a solid understanding of core local system administration and networking concepts and be experienced with Linux (or more generally UNIX), especially at the command line level.

Course Outline

 
Introduction
Linux Foundation
Linux Foundation Training
Logistics
 
Introduction to Security
What is Security
 
Threats and Risk Assessment
Types of Attacks
Trade Offs
 
Physical Access
Physical Security
Hardware Security
Understanding the Linux Boot Process
 
Logging
Logging Overview
Syslog Services
The Linux Kernel Audit Daemon
Linux Firewall Logging
Log Reports
 
Auditing and Detection
Auditing Basics
Understanding an Attack Progression
Detecting an Attack
Intrusion Detection Systems
 
Application Security
Bugs, Beetles, and More
Tracking and Documenting Changes
Resource Access Control
Mitigation Techniques
Policy Based Access Control Frameworks
Real World Example
 
Kernel Vulnerabilities
Kernel and User Spaces
Bugs
Mitigating Kernel Vulnerabilities
Vulnerabilities Examples
 
Authentication
Encryption and Authentication
Passwords
Hardware Tokens
Biometric Authentication
Network and Centralized Authentication
 
Local System Security
Standard UNIX Permissions
Administrator Account
Advanced UNIX Permissions
Filesystem Integrity
Filesystem Quotas
 
Network Security
TCP/IP Protocols Review
Remote Trust Vectors
Remote Exploits
 
Network Services Security
Network Tools
Databases
Web Server
File Servers
 
Denial of Service
Network Basics
DoS Methods
Mitigation Techniques
 
Remote Access
Unencrypted Protocols
Accessing Windows Systems
SSH
IPSEC VPNs
 
Firewalling and Packet Filtering
Firewalling Basics
Netfilter (IPTables)
Netfilter Implementation
Mitigate Brute Force Login Attempts
 
Response and Mitigation
Preparation
During an Incident
Handling Incident Aftermath
Conclusion

Course Directory [training on all levels]

Upcoming Classes