The Knowledge Academy

UNIX Security

The Knowledge Academy
In Cardiff

Prefer to call the centre directly?
01344... More

Important information

Typology Course
Location Cardiff (Wales)
Duration 2 Days
Start Different dates available
  • Course
  • Cardiff (Wales)
  • Duration:
    2 Days
  • Start:
    Different dates available

Delegate pack consisting of course notes and exercises Manual Experienced Instructor Refreshments

Facilities (1)
Where and when
Starts Location
Different dates available
Castle Street, CF10 1SZ, Cardiff, Wales
See map
Starts Different dates available
Castle Street, CF10 1SZ, Cardiff, Wales
See map

Questions & Answers

Ask a question and other users will answer you


Not rated
Course rating
Centre rating

Reviews on this course

There are no opinions on this course yet
Reviews gathered by Emagister & iAgora

Achievements for this centre


How do you get the CUM LAUDE seal?

All courses are up to date

The average rating is higher than 3.7

More than 50 reviews in the last 12 months

This centre has featured on Emagister for 3 years

What you'll learn on the course

Access Control
IT Auditing
IT Security
Network Training
IT Management
IT Auditing
IT Auditing

Course programme

The Knowledge Academy UNIX Audit & Security Course 2 day course covers the following topics:


This course is designed for individuals who need to find out what UNIX is and where the different components are located, with a specific security objective in mind. Planning for audits and discussion of suitable tests forms a substantial part of the course.

Individuals will get a chance to run audit and security related commands.


  • Individuals should have experience of using UNIX
  • Shell Programming and C Programming experience would be an advantage

Who Should Attend

  • Computer Auditors
  • Security Specialists
  • Security Conscious Managers

Course Content

Introduction to Audit & Security

  • Audit & Security
  • Security
  • Audit
  • Checklist-Based Auditing
  • Risk-Based Auditing
  • Audit Plan
  • Check Lists
  • DISA Database STIG
  • NIST
  • The Big Picture

Access Control

  • Intrusion Prevention
  • Intrusion Detection
  • Secure Data Storage
  • Secure Data Access
  • UNIX Deployment Model

Introduction to UNIX

  • History Of Unix
  • Unix Features
  • Unix System V
  • Standards
  • UNIX Architecture
  • UNIX Standards
  • Product Standards
  • Application Programming Interface
  • Commands & Utilities
  • Operating System Versions
  • Solaris
  • HP-UX
  • AIX
  • IRIX
  • Linux
  • Patch Levels

UNIX Start-up & Shutdown

  • Power On
  • Kernel Processes
  • init
  • System V
  • BSD
  • Changing Run Levels
  • Changing run levels with init
  • Graceful Run Level Changes
  • Quick Shutdown
  • Firmware
  • Boot to Single User Mode
  • Start Solaris Installation
  • Boot From alternative boot disk
  • Emergency boot From CDROM

Access Control

  • Managing Logins
  • Login Processes
  • Local Login
  • (‘Old’ System V – up to Sys V Rel 3)
  • (‘New’ System V – from Sys V Rel 4)
  • (BSD Unix)
  • Network Login
  • Accepting a login name
  • Logon Banners

Creating & Maintaining User Accounts

  • /etc/passwd
  • /etc/shadow
  • useradd
  • The group file
  • The Shells
  • Customising User Environments - Initialisation Scripts
  • Password Management
  • Lock A User Account
  • The root Account
  • Restricting Root Access
  • Encrypting Root Network Access
  • Reserved User Accounts
  • Single-User Mode
  • Multi-User Mode
  • Shared User Accounts
  • Duplicate User ID Accounts

System Security

  • Usernames & Passwords
  • /etc/passwd and /etc/shadow
  • Password Ageing
  • Login Control with /etc/default/login
  • Switching User with su
  • su Control with /etc/default/su
  • Limiting The Number Of Failed Login Attempts
  • Setting Minimum Password Length
  • Password Character Mix
  • Password Repeating Characters
  • Standard File & Directory Permissions
  • File & Directory Permissions
  • Special Permissions SUID & GUID
  • Access Control Lists

Process Management

  • Processes Overview
  • Parent & Child
  • Killing Application Processes
  • Changing Process Priorities
  • Changing Priority of Running Processes With renice

Scheduling & Job Control

  • Delayed Execution with the at Command
  • Restricting Access To at
  • Cron
  • Restricting Access To cron
  • Logging

Disk Management

  • Partition and Volume Group Layout
  • Disk Layout
  • Solaris Partitions & Slices
  • Device Files
  • Logical Device Names
  • RAID
  • Physical Device Names
  • UNIX File Systems
  • Traditional UNIX Filesystem
  • Journaled File Systems
  • Mounting a Filesystem
  • Unmounting a File System
  • Mounting At Boot Time
  • Traditional File System Corruption
  • File System Checking With fsck
  • NFS File Systems
  • RAM Based File Systems
  • Swap Management

Backing Up

  • Backup Media
  • Why Backup?
  • Backup Types
  • Full Backup
  • Incremental Backup
  • Partial Backup
  • Backing Up With tar
  • Absolute and Relative Paths
  • Image Copying With dd
  • Backing Up With cpio
  • Backing Up With dump
  • Dump Levels

Network Services

  • Secure Shell
  • FTP
  • Restricting FTP access
  • Anonymous FTP
  • Secure FTP
  • The R Commands
  • Host-Level Security with /etc/hosts.equiv
  • User-Level Security with .rhosts
  • The rlogin Command
  • The rcp Command
  • The rsh & rcmd Commands

UNIX Vulnerabilities

  • Intrusion Detection
  • Network Services
  • /etc/inetd.conf
  • /etc/hosts.allow
  • Denial Of Service Attacks
  • Trojan Horses, Viruses & Worms
  • Vi Editor
  • .exrc
  • Shell Escapes
  • Set user ID programs
  • Booting from CD
  • File System Ownership & Permissions
  • File system Corruption
  • Startup and Shutdown Scripts
  • UNIX services
  • Network Service User Equivalence
  • Backup storage
  • System Clock

UNIX Auditing

  • The find command
  • The grep command
  • The who command
  • The last command
  • The ps command
  • System Accounting

Additional information

  • UNIX Training provided by the Largest Training Company globally
  • Computer Auditors, Security Specialists & Security Conscious Managers recommended
  • Designed for individuals who need to find out what UNIX is and where the different components are located
  • Individuals will get a chance to run audit and security related commands
  • Courses delivered by world class UNIX training instructors in luxury venues 
  • UNIX Training includes material and manuals
  • Book Online or Call 01344 203999 to speak to an UNIX training advisor today

Students that were interested in this course also looked at...
See all