Linux Security Fundamentals (LFS216)

Course Overview

This course is a comprehensive look at the security challenges that can affect almost every system, especially with the seamless connectivity we seek from the Internet. Many of the features for securing Linux are built in to either the Linux Kernel or added by the various Linux Distributions.

This class explores many of these options to secure the systems. In some cases specialized Linux appliances are used to demonstrate how one would interact with corporate production servers. This is an encompassing class experience that will further expand your awareness of security issues and preventative measures.

Delivery Method: Online Self-Paced

Includes

  • 50 hours of Course Material
  • Hands-on Labs & Assignments
  • Video Content
  • 12 Months of Access to Online Course
  • Discussion Forums

Experience Level: Intermediate

Course Outline

Chapter 1. Course Introduction
Chapter 2. Security Basics
Chapter 3. Threats and Risk Assessment
Chapter 4. Physical Access
Chapter 5. Logging
Chapter 6. Auditing and Detection
Chapter 7. Application Security
Chapter 8. Kernel Vulnerabilities
Chapter 9. Authentication
Chapter 10. Local System Security
Chapter 11. Network Security
Chapter 12. Network Services Security
Chapter 13. Denial of Service
Chapter 14. Remote Access
Chapter 15. Firewalling and Packet Filtering
Chapter 16. Response and Mitigation
Chapter 17. Compliance Testing with OSCAP

Prerequisites

You should be able to download files from the Internet, configure virtual machines, import a virtual appliance and a “host only” virtual private network. Basic Linux command line skills (covered in LFS201 – Essentials of System Administration) are required.

Familiarity with Red Hat Linux, CentOS or Fedora is highly recommended.

register

Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.