Linux Security

PT15297
Training Summary
As Linux (and its derivatives) has proven to be the most deployed Operating System on the planet, it does not come free of risks. Moreover, given its roots as a General Purpose Operating System, some tradeoffs must be made between security and usability. In addition to that, being an ever-evolving Open-Source ecosystem, it’s hard to keep track of the latest tools, latest bug fixes, latest bugs introduced, and best practices and configuration options. In this intensive hands-on course, which is targeted mainly towards System Administrators and Field Support Engineers—you will learn to analyze and mitigate the risks involved with your Linux product.
Prerequisites
To take this course, you must know your way around a modern Linux distribution. You should be able to answer most of the following questions: • How do you use the following commands: ls, ps, cp, mv, pwd, cat, chmod, chown, mount, etc. • How to add, remove and modify user accounts • What is the init process? • What are users and groups in Linux and how do r/w/x permissions work?
Duration
5 Days/Lecture & Lab
Audience
System Administrators and IT managers as well as Integrators and Field Support/Application Engineers who are interested in understanding and hardening their deployed Linux based products (Servers, IoT end-points)
Course Topics
Introduction to Security
  • Linux Startup and monitoring
  • Binary level and OS level Security
  • Access Control
  • Applied Cryptography
  • System Level Network Security
  • Linux Hardening
  • Introduction to Malware Analysis
  • Introduction to Android Security

Related Scheduled Courses