Home    |    Instructor-led Training    |    Online Training     
         
 
Courses
ADA
Adobe
Agile
AJAX
Android
Apache
AutoCAD
Big Data
BlockChain
Business Analysis
Business Intelligence
Business Objects
Business Skills
C/C++/Go programming
Cisco
Citrix
Cloud Computing
COBOL
Cognos
ColdFusion
COM/COM+
CompTIA
CORBA
CRM
Crystal Reports
Data Science
Datawarehousing
DB2
Desktop Application Software
DevOps
DNS
Embedded Systems
Google Web Toolkit (GWT)
IPhone
ITIL
Java
JBoss
LDAP
Leadership Development
Lotus
Machine learning/AI
Macintosh
Mainframe programming
Mobile
MultiMedia and design
.NET
NetApp
Networking
New Manager Development
Object oriented analysis and design
OpenVMS
Oracle
Oracle VM
Perl
PHP
PostgreSQL
PowerBuilder
Professional Soft Skills Workshops
Project Management
Python
Rational
Ruby
Sales Performance
SAP
SAS
Security
SharePoint
SOA
Software quality and tools
SQL Server
Sybase
Symantec
Telecommunications
Teradata
Tivoli
Tomcat
Unix/Linux/Solaris/AIX/
HP-UX
Unisys Mainframe
Visual Basic
Visual Foxpro
VMware
Web Development
WebLogic
WebSphere
Websphere MQ (MQSeries)
Windows programming
XML
XML Web Services
Other
LINUX LEVEL 3 – LINUX SECURITY
Linux Training Overview:

This five-day course provides students with the knowledge to perform system administration tasks relating to kernel management and system security. These topics include the proc filesystem configuration, kernel rebuilds and backups as well as log file maintenance. The course moves into security issues including physical security of the host and console, user and system accounts, network and firewall security and software security. The course ends with intrusion detection techniques.

Linux Training Audience:

Linux system administrators who want to build competency with kernel builds and system security.

Learning Prerequisites:

Linux Level 2 or equivalent experience.

Linux Training Course duration:

5 days

Linux Training Course outline:

The proc File System

  • What is the proc File System?
  • Viewing System Information
  • Viewing Process Information
  • Viewing and Changing Kernel Features
  • The sysctl Command
  • The /etc/sysctl.conf File
Loadable Kernel Modules
  • What are Loadable Kernel Modules?
  • Loading LKMs
  • Displaying LKMs
  • Unloading LKMs
  • Loading Modules that have Dependencies
Rebuilding the Kernel
  • Kernel Source Files
  • Extract the Source Files
  • Apply the Patch Files
  • Initial Configuration Steps
  • Configure the 2.4 Kernel
  • Configure the 2.6 Kernel
  • Building the Kernel
  • Using the New Kernel
  • Building a Red Hat Enterprise Linux Kernel
  • Kernel Parameters
Log File Administration
  • System Log Daemons
  • The /etc/syslog.conf File
  • The /etc/sysconfig/syslog File
  • Default System Log Files
  • Using logrotate to Maintain Log Files
  • Using logwatch to Monitor Log Files
  • Using redhat-logviewer to Monitor Log Files
  • Generating Messages with logger
Backups
  • Backing Up Data
  • Backup Media
  • Backup Methods
  • Device Files
  • Using the dump and restore Commands
  • Using the tar Commands
  • Using the gzip Command
  • Using the zip Command
  • Using the bzip2 Command
  • Using the cpio Command
  • Additional Utilities
Security Overview
  • What is Security?
  • Balance
  • Staying Up to Date
  • Documentation
  • Thinking like the Enemy
  • What is a Security Policy?
  • Step 1 - Initially Secure the System
  • Step 2 - Maintain System Security
  • Step 3 - Recovery
Physical Security
  • What is Physical Security?
  • Access Protection
  • Protecting BIOS
  • Protecting the Boot Loader
  • Disabling Reboots
  • Using vlock
  • Devices
  • Natural Disasters
  • Hardware Error
  • Theft
Securing User Accounts
  • Account Names
  • Mail Aliases
  • The /etc/passwd, /etc/shadow, /etc/group and /etc/gshadow Files
  • Displaying User Information
  • Users and their Passwords
  • Users with no Passwords
  • Forcing Users to Change their Password
  • Preventing Users from Changing their Password
  • Application Accounts
  • Same UID, Multiple User Accounts
  • Setting Accounts Defaults
  • Process Accounting
  • Tools
Securing System Accounts
  • Securing the Root Account
  • Root Password and Name
  • The root's PATH Variable
  • Physically Protecting the root Account
  • Disallowing root Access
  • Limiting Access to root via su
  • Enabling Automatic Logouts
  • Granting root Access via the sudo Command
  • Securing System Accounts
Securing The Filesystem
  • File Permissions and Ownership
  • Disk Space Usage
  • Securing crontab and at
  • File Attributes
  • File System mount Options
  • Tools
PAM
  • What is PAM?
  • Syntax of PAM configuration files
  • PAM categories
  • PAM controls
  • PAM Modules
  • Using PAM to alter the password policy
  • Using PAM to provide resource limits
  • Using PAM to limit services
  • Using PAM to limit access time to services
  • Disabling console privileges
  • Other PAM features
TCP Wrappers
  • The configuration files
  • Syntax of /etc/hosts.allow and /etc/hosts.deny
  • Using tcp_wrappers banners
  • Logging tcp_wrappers connections
  • Avoiding using two configuration files
  • Using spawn and twist
  • Additional tcp_wrappers options
Firewalls
  • Kernel level firewalls in Linux
  • Overview of iptables
  • Overview of filtering packets
  • Filtering incoming packets on the local system
  • Filtering outgoing packets on the local system
  • Using NAT
  • Saving tables
The xinetd Service
  • The /etc/xinetd.conf File
  • The /etc/xinetd.d Directory
  • Important Attributes for xinetd-based Services
  • Additional xinetd Considerations
Intrusion Detection
  • Performing the intrusion detection
  • Monitoring network activity
  • Probing for modified files
  • Third party tools
Appendix A - Preparing for Certification Exams

Appendix B - Preparing for RHCE and RHCT Exams

Appendix C - Preparing for the LPI Exams

Appendix D - Preparing for the Linux+ Exam


Please contact your training representative for more details on having this course delivered onsite or online

Training Outlines - the one stop shopping center for IT training.
© Training Outlines All rights reserved