Course Overview
The course will teach students how to use local and network security. This is a course for those responsible for the configuration, managing and setup of Linux system security e.g. kernel security, data security, file system security, password security, ACLs, SELinux, network services security, TCPWrappers, Linux-based firewall with iptables and Virtual Private Networking.
 
 
 
Goal
Upon completion of this course, students should be able to:
|   | 
Discuss network and local system security and place the firewall thereinInstall and harden Linux systemSystem monitoringUnderstand PAM authenticationSecuring the kernel, file systems and dataManage TCPWrappers for securing servicesSELinux administrationConfigure iptables packet filtering and Network Address TranslationConfigure Virtual Private NetworkingConfigure and use hacker’s toolsDetect and counter firewall intrusions | 
Pre-Requisites
Have an experience using Linux Operating System and have basic programming skills.
 
Who Should Attend?
This course is designed for experienced Linux and networking professionals who are responsible for configuring and maintaining security for Linux systems. System / Network administrators & support people, programmers and prospective Linux power users, looking to harness the power of task automation through shell scripting.
 
Linux Security Administration – Schedule 
| Day 1 | 
| 09.00am – 10.00am | Introduction to Security and Firewall 
Definition of securitySecurity policyType of attackPrinciples of securitySecurity practicesHackers, crackers and script kiddiesMotivation of hackers and crackersWhat you have to loseWhat is a firewall?Position of a firewallVirtual Private NetworkingNetwork security techniques and usage | 
| 10.00am – 10.30am | Breakfast | 
| 10.30am – 12.45pm | PAM Authentication 
AuthenticationPAMPassword securityPassword policyUtilities and authenticationPAM troubleshooting | 
| 12.45pm – 02.15pm | Lunch | 
| 02.15pm – 05.00pm | System Monitoring   
Introduction to system monitoringFile system analysisSystem log fileLog file analysisMonitoring processProcess monitoring utilitiesSystem activity reportingLimiting processProcess accounting tools Installing and Securing Linux 
Installing LinuxApplying patchesKernel recompilationHardening LinuxUser account considerationsDisabling servicesFilesystem HardeningAccess Control Lists (ACLs)Kernel tuning and configuration options | 
| Day 2 | 
| 09.00am – 10.00am | Securing Services  
System V startup controlSecuring the servicesTCPWrappers configurationSecuring xinetdSecuring DNSSecuring Mail | 
| 10.00am – 10.30am | Breakfast | 
| 10.30am – 12.45pm | Securing Data 
Fundamentals of encryptionThe need for encryptionSymmetric encryptionAsymmetric encryptionPublic Key Infrastructure (PKI)Digital certificates | 
| 12.45pm – 02.15pm | Lunch | 
| 02.15pm – 05.00pm | SELinux Administration 
Security Enhanced Linux (SELinux)SELinux targeted policySELinux installation options and controlControlling SELinuxSELinux contextsTroubleshooting SELinux | 
|                                                                         Day 3 | 
| 09.00am – 10.00am | Securing Network 
Packet filtering overviewNetwork Address TranslationKernel-level firewall implementation with iptablesProtection against spoofed addressesIP masqueradingFWBuilder | 
| 10.00am – 10.30am | Breakfast | 
| 10.30am – 12.45pm | Virtual Private Networking 
Virtual Private Network conceptsVirtual Private Network solutionsIPSec | 
| 12.45pm – 02.15pm | Lunch | 
| 02.15pm – 05.00pm | Hacker’s Tools 
SniffersEtherealNmapNessus |