NEW COURSE!

Linux Systems Administration: Fundamentals of Linux Security

In this course, you will learn the basics of Linux system security. These are some of the tools and skills a system administrator needs to become a security engineer. This course focuses on network security issues and will help you improve the security of your systems by starting to think like an attacker.

Upon completion of this course, you will be able to:

  • Verify password security.
  • Enforce password strength via system policies.
  • Assess system service security both locally and remotely
  • Identify unknown open ports.
  • Disable unwanted, insecure services.
  • Analyze network packet captures for unencrypted data.
  • Implement local system firewall controls using IPTables.

From beginning to end, you will learn by doing Linux-based projects and submitting them for instructor feedback. These projects, as well as the final project, will add to your portfolio. Besides a browser and Internet connection, all software is provided by The O’Reilly School of Technology.

Prerequisites: Linux Systems Administration: The Command Line, Linux Systems Administration: Networking and Package Management, Linux Systems Administration: Services or equivalent skills. This course is meant for the intermediate or advanced system administrator.

90 Clock-hours

$398.00 (plus fees)

Enroll in Course

Course Details and Syllabus

Course: Linux Systems Administration: Fundamentals of Linux Security
Tuition: $398.00 (plus fees)
Time Frame: This course is online and self-paced. You can expect to work approximately 90 hours on this course.
Technical Requirements: As long as you have a web browser and internet connection, you can take this course from anywhere in the world.
Software: The web-based Learning Sandbox™ provided for you will contain all your lessons, projects, quizzes, account files, editors, and tools necessary to build your skills from beginning to end, even beyond coursework. In addition, you will be provided with a virtual Linux root server which can be accessed through the Sandbox or, if you prefer, any normal SSH program. No other software is needed.
Instructor: You will have one instructor throughout the course who will evaluate your projects and quizzes, hand them back for improvement when necessary, and coach you throughout your skills advancement.
Book: All required course materials and software are included online within the Learning Sandbox™. However, within a few weeks of enrolling, you’ll receive the e-book How to Cheat at Securing Linux as a reference resource from O’Reilly.How to cheat at securing linux book cover
Certificates: This course is not currently part of a certificate series.
Prerequisites: Linux Systems Administration: The Command Line, Linux Systems Administration: Networking and Package Management, or equivalent intermediate to advanced system administration skills. This course is meant for the intermediate or advanced system administrator.
Topics: Password strength and policy enforcement, Remote and Local assessment, TCPDump and IPTables.
Syllabus: Lesson 1: Introduction to Linux System Security

  • Before We Start Coding
  • The Linux Learning Environment
  • Using the Linux Learning Environment
  • Setting Up Networking
  • Configuring the Default Route
  • Logging Out

Lesson 2: Passwords: Strength, Default Passwords, and Local Cracking

  • Root Access
  • Installing Your Course Files
  • Passwords
  • Password Strength
  • Mathematics of Password Searchspace

Lesson 3: Passwords: Policy Enforcement

  • Passwords: Configuring Password Strength Requirements
  • Password Expiration
  • PAM Overview
  • PAM cracklib
  • Password History

Lesson 4: Remote Assessment: Nmap

  • Remote System Assessment: nmap
  • Other Useful Scanning Options

Lesson 5: Remote Assessment: Investigation and Testing

  • Remote System Assessment: Investigation and Testing
  • Research What You Know
  • Testing the Vulnerability
  • Metasploit Framework

Lesson 6: Local Assessment: Services

  • Local System Assessment: Services
  • SysV Services
  • Xinetd Services
  • Why Do We Care About Local Services?

Lesson 7: Local Assessment: Netstat, Fuser, Lsof, and SetUID Files

  • Local System Assessment: Netstat
  • Netstat
  • fuser and /proc
  • lsof
  • netstat revisited
  • SetUID Files

Lesson 8: Introduction to TCPDump

  • Tcpdump: Introduction
  • Packet Captures
  • Analyzing Your First Packet
  • Creating New Captures
  • Review Your Captured Packets
  • Behind the Scenes

Lesson 9: Introduction to TCPDump

  • Tcpdump: Filters
  • Protocol Filter Example
  • Some TCP Packet Details
  • Filtering on Ports
  • Filters Based on Packet Header Fields

Lesson 10: IPTables: Introduction to Firewalls

  • Firewalls
  • Mostly Open
  • Mostly Closed
  • More Basic IPTables Rules
  • Specify Source IP

Lesson 11: IPTables: Chains, Logging, and Connection Limits

  • Chains, Logging, and Connection Limits
  • Defining Your Own Chains
  • Logging
  • Connection Limiting

Lesson 12: IPTables: Speed Limits and Tracking Recent Connections

  • Speed Limits and Recent Hits
  • Speed Limits
  • Tracking Recent Hits
  • Recent Module w/ NEW State
  • Multiport Rules
  • Outbound Connections

Lesson 13: IPTables: Multiport, Outbound Filters, and Misc Network Security Settings