Prices are not automatically updated, might differ on a partner’s site.
After completing this course you will be able to assess your current security needs, evaluate your current security readiness and implement security options as required. Everyone involved with any security-related tasks including implementation technicians, developers and managers will gain additional expertise from this course.
This course is a comprehensive look at the security challenges that can affect almost every system, especially with the seamless connectivity we seek from the Internet. Many of the features for securing Linux are built into either the Linux Kernel or added by the various Linux Distributions. This class explores many of these options to secure the systems. In some cases, specialized Linux appliances are used to demonstrate how one would interact with corporate production servers. This is an encompassing class experience that will further expand your awareness of security issues and preventative measures.
The class starts with an overview of Computer Security and touches on how security affects everyone in the chain of development, implementation, administration and the end-user.
This course is designed to work with a wide range of Linux distributions, so you will be able to apply these concepts regardless of your distro.
You will have access to the course for a full year from the date of purchase, regardless of how quickly you complete the course. You can expect the course to take 40-50 hours to complete (although the course is self-paced, so you can move as quickly or as slowly as you like).
Chapter 1. Course Introduction
Chapter 2. Security Basics
Chapter 3. Threats and Risk Assessment
Chapter 4. Physical Access
Chapter 5. Logging
Chapter 6. Auditing and Detection
Chapter 7. Application Security
Chapter 8. Kernel Vulnerabilities
Chapter 9. Authentication
Chapter 10. Local System Security
Chapter 11. Network Security
Chapter 12. Network Services Security
Chapter 13. Denial of Service
Chapter 14. Remote Access
Chapter 15. Firewalling and Packet Filtering
Chapter 16. Response and Mitigation
Chapter 17. Compliance Testing with OSCAP
You should be able to download files from the Internet, configure virtual machines, import a virtual appliance and a “host-only” virtual private network. Basic Linux command line skills (covered in LFS201 – Essentials of System Administration) are required. Familiarity with Red Hat Linux, CentOS or Fedora is highly recommended.