Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Introduction
- Linux Foundation
- Linux Foundation Training
- Linux Foundation Certifications
- Linux Foundation Digital Badges
- Laboratory Exercises, Solutions and Resources
- E-Learning Course: LFS216
- Distribution Details
- Labs
- Security Basics
What is Security?
- Assessment
- Prevention
- Detection
- Reaction
- Labs
- Threats and Risk Assessment
Classes of Attackers
- Types of Attacks
- Trade Offs
- Labs
- Physical Access
Physical Security
- Hardware Security
- Understanding the Linux Boot Process
- Labs
- Logging
Logging Overview
- Syslog Services
- journald Services
- The Linux Kernel Audit Daemon
- Linux Firewall Logging
- Log Reports
- Labs
- Auditing and Detection
Auditing Basics
- Understanding an Attack Progression
- Detecting an Attack
- Intrusion Detection Systems
- Labs
- Application Security
Bugs and Tools
- Tracking and Documenting Changes
- Resource Access Control
- Mitigation Techniques
- Policy Based Access Control Frameworks
- Real World Example
- Labs
- Kernel Vulnerabilities
Kernel and User Spaces
- Bugs
- Mitigating Kernel Vulnerabilities
- Vulnerabilities Examples
- Labs
- Authentication
Encryption and Authentication
- Passwords and PAM
- Hardware Tokens
- Biometric Authentication
- Network and Centralized Authentication
- Labs
- Local System Security
Standard UNIX Permissions
- Administrator Account
- Advanced UNIX Permissions
- Filesystem Integrity
- Filesystem Quotas
- Labs
- Network Security
TCP/IP Protocols Review
- Remote Trust Vectors
- Remote Exploits
- Labs
- Network Services Security
Network Tools
- Databases
- Web Server
- File Servers
- Labs
- Denial of Service
Network Basics
- DoS Methods
- Mitigation Techniques
- Labs
- Remote Access
Unencrypted Protocols
- Accessing Windows Systems
- SSH
- IPSEC VPNs
- Labs
- Firewalling and Packet Filtering
Firewalling Basics
- iptables
- Netfilter Implementation
- Netfilter rule management
- Mitigate Brute Force Login Attempts
- nft Concepts
- Labs
- Response and Mitigation
Preparation
- During an Incident
- Handling Incident Aftermath
- Labs
- Compliance testing with OSCAP
Compliance Testing
- SCAP Introduction
- OpenSCAP
- SCAP Workbench
- Command Line Scan
- Labs
Requirements
To maximize the value of this course, you should:
- Possess a strong grasp of core local system administration and networking principles, equivalent to the knowledge gained from LFS301 Linux System Administration and LFS311 Linux Networking and Administration.
- Have practical experience with Linux (or UNIX in general), particularly at the command line interface.
Target Audience
This course is designed for Linux system administrators with existing experience who aim to strengthen their security capabilities. Prospective participants must have a solid understanding of fundamental system administration and networking concepts, along with hands-on experience in Linux (or UNIX), especially when operating via the command line.
Experience Level: Intermediate
28 Hours