0% found this document useful (0 votes)
162 views4 pages

Lfs 416

This document outlines the content covered in a Linux security course, including introductions, security basics, threats and risk assessment, physical access, logging, auditing and detection, application security, kernel vulnerabilities, authentication, local system security, network security, network services security, denial of service, remote access, firewalling and packet filtering, response and mitigation, and compliance testing with OSCAP. Each section includes a list of learning objectives and hands-on labs.

Uploaded by

Aung Aung
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
162 views4 pages

Lfs 416

This document outlines the content covered in a Linux security course, including introductions, security basics, threats and risk assessment, physical access, logging, auditing and detection, application security, kernel vulnerabilities, authentication, local system security, network security, network services security, denial of service, remote access, firewalling and packet filtering, response and mitigation, and compliance testing with OSCAP. Each section includes a list of learning objectives and hands-on labs.

Uploaded by

Aung Aung
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Course Content

Introduction

 Linux Foundation
 Linux Foundation Training
 Linux Foundation Certifications
 Laboratory Exercises, Solutions and Resources
 E-Learning Course: LFS216
 Distribution Details
 Labs

Security Basics

 What is Security?
 Assessment
 Prevention
 Detection
 Reaction
 Labs

Threats and Risk Assessment

 Classes of Attackers
 Types of Attacks
 Trade Offs
 Labs

Physical Access

 Physical Security
 Hardware Security
 Understanding the Linux Boot Process
 Labs

Logging

 Logging Overview
 Syslog Services
 The Linux Kernel Audit Daemon
 Linux Firewall Logging
 Log Reports
 Labs

Auditing and Detection


 Auditing Basics
 Understanding an Attack Progression
 Detecting an Attack
 Intrusion Detection Systems
 Labs

Application Security

 Bugs and Tools


 Tracking and Documenting Changes
 Resource Access Control
 Mitigation Techniques
 Policy Based Access Control Frameworks
 Real World Example
 Labs

Kernel Vulnerabilities

 Kernel and User Spaces


 Bugs
 Mitigating Kernel Vulnerabilities
 Vulnerabilities Examples
 Labs

Authentication

 Encryption and Authentication


 Passwords and PAM
 Hardware Tokens
 Biometric Authentication
 Network and Centralized Authentication
 Labs

Local System Security

 Standard UNIX Permissions


 Administrator Account
 Advanced UNIX Permissions
 Filesystem Integrity
 Filesystem Quotas
 Labs

Network Security

 TCP/IP Protocols Review


 Remote Trust Vectors
 Remote Exploits
 Labs

Network Services Security

 Network Tools
 Databases
 Web Server
 File Servers
 Labs

Denial of Service

 Network Basics
 DoS Methods
 Mitigation Techniques
 Labs

Remote Access

 Unencrypted Protocols
 Accessing Windows Systems
 SSH
 IPSEC VPNs
 Labs

Firewalling and Packet Filtering

 Firewalling Basics
 iptables
 Netfilter Implementation
 Netfilter rule management
 Mitigate Brute Force Login Attempts
 Labs

Response and Mitigation

 Preparation
 During an Incident
 Handling Incident Aftermath
 Labs

Compliance testing with OSCAP


 Compliance Testing
 SCAP Introduction
 OpenSCAP
 SCAP Workbench
 Command Line Scan
 Labs

You might also like