Course not currently available
Linux Security Training Course
Course
Online
Description
-
Type
Course
-
Methodology
Online
During the course, participants will learn among other things as:
How to hack into the server and how to protect your server against hackers?
How to see the user's password and how to select the password?
How to limit user resources (memory, CPU time, the maximum number of processes, number of logins, etc ...)?
How to check if the files on the disk are damaged or how to check if someone with them "tinkered"?
How to send log files to remote machine?
How to protect your log files before modification?
How to securely erase files so that no one could have them anymore preview?
How to create an encrypted file system?
How to encrypt and sign files?
How to protect yourself from exploits?
About this course
Knowledge of any Unix-like
Reviews
Subjects
- Monitoring
- Systems
- Linux
- Server
Course programme
- Protection against accidental restart CTRL + ALT + DEL
- Prevention booting kernel with additional parameters
- Automatic session logout
- Locking the virtual console
Upgrading the system
The rights and ownership
- Umask
- SUID
- Sticky bit
- Mounts partition with additional parameters
- Determining the size of the partition and file system
- Capacity Limits for Users (quota)
- MD5sum and friends
- TRIPWIRE
- dm-verify
- Secure delete (s) attribute
- Secure undelete (d) attribute
- Wipe, shred
- dm-crypt
- LUKS
- ecryptfs
- Program GnuPG
- Program PGP
- Remote logging
- Securing logfiles
- Preventing log tampering
- Next generation syslog
- journald
- Log monitoring
- Log files and other forms of monitoring
- OpenWall
- GetRewted
- LIDS
- RBSAC
Additional information
Linux Security Training Course