Linux Security Training Course

Course

In City Of London

Price on request

Description

  • Type

    Course

  • Location

    City of london

During the course, participants will learn among other things as:
How to hack into the server and how to protect your server against hackers?
How to see the user's password and how to select the password?
How to limit user resources (memory, CPU time, the maximum number of processes, number of logins, etc ...)?
How to check if the files on the disk are damaged or how to check if someone with them "tinkered"?
How to send log files to remote machine?
How to protect your log files before modification?
How to securely erase files so that no one could have them anymore preview?
How to create an encrypted file system?
How to encrypt and sign files?
How to protect yourself from exploits?

Facilities

Location

Start date

City Of London (London)
See map
Token House, 11-12 Tokenhouse Yard, EC2R 7AS

Start date

On request

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Reviews

Subjects

  • Linux
  • Server
  • Network
  • Art
  • Network Training

Course programme

Securing the physical console

  • Protection against accidental restart CTRL + ALT + DEL
  • Prevention booting kernel with additional parameters
  • Automatic session logout
  • Locking the virtual console
Upgrading the system The rights and ownership
  • Umask
  • SUID
  • Sticky bit
Hard links Security file systems
  • Mounts partition with additional parameters
  • Determining the size of the partition and file system
  • Capacity Limits for Users (quota)
Backup system Data integrity checking
  • MD5sum and friends
  • TRIPWIRE
  • dm-verify
Safe file delete
  • Secure delete (s) attribute
  • Secure undelete (d) attribute
  • Wipe, shred
Filesystem encryption
  • dm-crypt
  • LUKS
  • ecryptfs
File signing and encryption
  • Program GnuPG
  • Program PGP
Login accounting Process accounting Program and kernel messages logging
  • Remote logging
  • Securing logfiles
  • Preventing log tampering
  • Next generation syslog
  • journald
  • Log monitoring
  • Log files and other forms of monitoring
Cracking passwords Login and PAM System security and Kernel
  • OpenWall
  • GetRewted
  • LIDS
  • RBSAC

Linux Security Training Course

Price on request