Close
Contact Us info@learnquest.com

??WelcomeName??
??WelcomeName??
« Important Announcement » Contact Us 877-206-0106 | USA Flag
Close
Close
Close
photo

Thank you for your interest in LearnQuest.

Your request is being processed and LearnQuest or a LearnQuest-Authorized Training Provider will be in touch with you shortly.

photo

Thank you for your interest in Private Training.

We look forward to helping you develop the perfect training solution to help you meet your company's goals.

For immediate assistance, speak with one of our representatives using the chat module below. Otherwise, LearnQuest or a LearnQuest-Authorized Training Provider will be in touch with you shortly.

Close
photo

Thank you for your interest in LearnQuest!

Now, you will be able to stay up-to-date on our latest course offerings, promotions, and training discounts. Watch your inbox for upcoming special offers.

title

Date: xxx

Location: xxx

Time: xxx

Price: xxx

Please take a moment to fill out this form. We will get back to you as soon as possible.

All fields marked with an asterisk (*) are mandatory.

Enterprise Linux Security Administration

Price
2,925 USD
5 Days
OSUN-312
Classroom Training, Online Training
Open Source

AWS Training Pass

Take advantage of flexible training options with the AWS Training Pass and get Authorized AWS Training for a full year.

Learn More

Prices reflect a 22.5% discount for IBM employees (wherever applicable).
Prices reflect a 24% discount for Kyndryl employees (wherever applicable).
Prices reflect the Accenture employee discount.
Prices shown are the special AWS Partner Prices.
Prices reflect the Capgemini employee discount.
Prices reflect the UPS employee discount.
Prices reflect the ??democompanyname?? employee discount.
GSA Private/Onsite Price: ??gsa-private-price??
For GSA pricing, please go to GSA Advantage.

Class Schedule

Delivery Formats

Sort results

Filter Classes

Guaranteed to Run

Modality

Location

Language

Date

    Sorry, there are no public classes currently scheduled in your country.

    Please complete this form, and a Training Advisor will be in touch with you shortly to address your training needs.

View Global Schedule

Course Description

Overview

This highly technical Enterprise Linux System Administration course focuses on properly securing machines running the Linux operating systems. A broad range of general security techniques such as packet filtering, password policies, and file integrity checking are covered. Advanced security technologies such as Kerberos and SELinux are taught. Special attention is given to securing commonly deployed network services. At the end of the course, students have an excellent understanding of the potential security vulnerabilities -- know how to audit existing machines, and how to securely deploy new network services.
 

Objectives

Upon completion of the course, students will be able to:
  • Predict potential security vulnerabilities
  • Audit existing machines
  • Recognize the best practices to securely deploy new Linux servers

Audience

  • Network Security Administrators
  • Security Specialists and Analysts
  • Linux System Administrators

Prerequisites

    • Students should already be comfortable working in a Linux or Unix environment
    • An understanding of network concepts, and the TCP/IP protocol suite is helpful
    • Fundamentals such as the Linux filesystem, process management, and how to edit files will not be covered in class
    • Successful completion of OSUN-120 Linux Fundamentals, OSUN-225 Enterprise Linux Systems Administration, and OSUN-230 Enterprise Linux Network Services or equivalent knowledge and experience

Topics

Security Concepts
  • Basic Security Principles
  • RHEL7 Default Install
  • RHEL7 Firewall
  • SLES12 Default Install
  • SUSE Basic Firewall Configuration
  • SLES12: File Security
  • Minimization – Discovery
  • Service Discovery
  • Hardening
  • Security Concepts
    • LAB TASKS
  • Removing Packages Using RPM
  • Firewall Configuration
  • Process Discovery
  • Operation of the setuid() and capset() System Calls
  • Operation of the chroot() System Call
Scanning, Probing, And Mapping Vulnerabilities
  • The Security Environment
  • Stealth Reconnaissance
  • The WHOIS database
  • Interrogating DNS
  • Discovering Hosts
  • Discovering Reachable Services
  • Reconnaissance with SNMP
  • Discovery of RPC Services
  • Enumerating NFS Shares
  • Nessus/OpenVAS Insecurity Scanner
  • Configuring OpenVAS
  • Intrusion Detection Systems
  • Snort Rules
  • Writing Snort Rules
    • LAB TASKS
NMAP
  • OpenVAS
  • Advanced nmap Options
  • PASSWORD SECURITY AND PAM
  • Unix Passwords
  • Password Aging
  • Auditing Passwords
  • PAM Overview
  • PAM Module Types
  • PAM Order of Processing
  • PAM Control Statements
  • PAM Modules
  • pam_unix
  • pam_cracklib.so
  • pam_pwcheck.so
  • pam_env.so
  • pam_xauth.so
  • pam_tally2.so
  • pam_wheel.so
  • pam_limits.so
  • pam_nologin.so
  • pam_deny.so
  • pam_warn.so
  • pam_securetty.so
  • pam_time.so
  • pam_access.so
  • pam_listfile.so
  • pam_lastlog.so
  • pam_console.so
  • LAB TASKS
  • John the Ripper
  • Cracklib
  • Using pam_listfile to Implement Arbitrary ACLs
  • Using pam_limits to Restrict Simultaneous Logins
  • Using pam_nologin to Restrict Logins
  • Using pam_access to Restrict Logins
  • su & pam
Secure Network Time Protocol (NTP)
  • The Importance of Time
  • Hardware and System Clock
  • Time Measurements
  • NTP Terms and Definitions
  • Synchronization Methods
  • NTP Evolution
  • Time Server Hierarchy
  • Operational Modes
  • NTP Clients
  • Configuring NTP Clients
  • Configuring NTP Servers
  • Securing NTP
  • NTP Packet Integrity
  • Useful NTP Commands
    • LAB TASKS
  • Configuring and Securing NTP
  • Peering NTP with Multiple Systems
Kerberos Concepts And Components
  • Common Security Problems
  • Account Proliferation
  • The Kerberos Solution
  • Kerberos History
  • Kerberos Implementations
  • Kerberos Concepts
  • Kerberos Principals
  • Kerberos Safeguards
  • Kerberos Components
  • Authentication Process
  • Identification Types
  • Logging In
  • Gaining Privileges
  • Using Privileges
  • Kerberos Components and the KDC
  • Kerberized Services Review
  • KDC Server Daemons
  • Configuration Files
  • Utilities Overview
Implementing Kerberos
  • Plan Topology and Implementation
  • Kerberos 5 Client Software
  • Kerberos 5 Server Software
  • Synchronize Clocks
  • Create Master KDC
  • Configuring the Master KDC
  • KDC Logging
  • Kerberos Realm Defaults
  • Specifying [realms]
  • Specifying [domain_realm]
  • Allow Administrative Access
  • Create KDC Databases
  • Create Administrators
  • Install Keys for Services
  • Start Services
  • Add Host Principals
  • Add Common Service Principals
  • Configure Slave KDCs
  • Create Principals for Slaves
  • Define Slaves as KDCs
  • Copy Configuration to Slaves
  • Install Principals on Slaves
  • Synchronization of Database
  • Propagate Data to Slaves
  • Create Stash on Slaves
  • Start Slave Daemons
  • Client Configuration
  • Install krb5.conf on Clients
  • Client PAM Configuration
  • Install Client Host Keys
    • LAB TASKS
  • Implementing Kerberos
Administering And Using Kerberos
  • Administrative Tasks
  • Key Tables
  • Managing Keytabs
  • Managing Principals
  • Viewing Principals
  • Adding, Deleting, and Modifying Principals
  • Principal Policy
  • Overall Goals for Users
  • Signing In to Kerberos
  • Ticket types
  • Viewing Tickets
  • Removing Tickets
  • Passwords
  • Changing Passwords
  • Giving Others Access
  • Using Kerberized Services
  • Kerberized FTP
  • Enabling Kerberized Services
  • OpenSSH and Kerberos
    • LAB TASKS
  • Using Kerberized Clients
  • Forwarding Kerberos Tickets
  • OpenSSH with Kerberos
  • Wireshark and Kerberos
Securing The Filesystem
  • Filesystem Mount Options
  • NFS Properties
  • NFS Export Option
  • NFSv4 and GSSAPI Auth
  • Implementing NFSv4
  • Implementing Kerberos with NFS
  • GPG – GNU Privacy Guard
  • File Encryption with OpenSSL
  • File Encryption With encfs
  • Linux Unified Key Setup (LUKS)
    • LAB TASKS
  • Securing Filesystems
  • Securing NFS
  • Implementing NFSv4
  • File Encryption with GPG
  • File Encryption With OpenSSL
  • LUKS-on-disk format Encrypted Filesystem
AIDE
  • Host Intrusion Detection Systems
  • Using RPM as a HIDS
  • Introduction to AIDE
  • AIDE Installation
  • AIDE Policies
  • AIDE Usage
    • LAB TASKS
  • File Integrity Checking with RPM
  • File Integrity Checking with AIDE
Accountability With Kernel Auditd
  • Accountability and Auditing
  • Simple Session Auditing
  • Simple Process Accounting & Command History
  • Kernel-Level Auditing
  • Configuring the Audit Daemon
  • Controlling Kernel Audit System
  • Creating Audit Rules
  • Searching Audit Logs
  • Generating Audit Log Reports
  • Audit Log Analysis
    • LAB TASKS
  • Auditing Login/Logout
  • Auditing File Access
  • Auditing Command Execution
SELinux
  • DAC vs. MAC
  • Shortcomings of Traditional Unix Security
  • AppArmor
  • SELinux Goals
  • SELinux Evolution
  • SELinux Modes
  • Gathering SELinux Information
  • SELinux Virtual Filesystem
  • SELinux Contexts
  • Managing Contexts
  • The SELinux Policy
  • Choosing an SELinux Policy
  • Policy Layout
  • Tuning and Adapting Policy
  • Booleans
  • Permissive Domains
  • Managing File Context Database
  • Managing Port Contexts
  • SELinux Policy Tools
  • Examining Policy
  • SELinux Troubleshooting
  • SELinux Troubleshooting Continued
    • LAB TASKS
  • Exploring SELinux Modes
  • Exploring AppArmor Modes
  • SELinux Contexts in Action
  • Exploring AppArmor
  • Managing SELinux Booleans
  • Creating Policy with Audit2allow
  • Creating & Compiling Policy from Source
Securing Apache
  • Apache Overview
  • httpd.conf – Server Settings
  • Configuring CGI
  • Turning Off Unneeded Modules
  • Delegating Administration
  • Apache Access Controls (mod_access)
  • HTTP User Authentication
  • Standard Auth Modules
  • HTTP Digest Authentication
  • TLS Using mod_ssl.so
  • Authentication via SQL
  • Authentication via LDAP
  • Authentication via Kerberos
  • Scrubbing HTTP Headers
  • Metering HTTP Bandwidth
    • LAB TASKS
  • Hardening Apache by Minimizing Loaded Modules
  • Scrubbing Apache & PHP Version Headers
  • Protecting Web Content
  • Protecting Web Content
  • Using the suexec Mechanism
  • Create a TLS CA key pair
  • Using SSL CA Certificates with Apache
  • Enable Apache SSL Client Certificate Authentication
  • Enabling SSO in Apache with mod_auth_kerb
  • SECURING POSTGRESQL
  • PostgreSQL Overview
  • PostgreSQL Default Config
  • Configuring TLS
  • Client Authentication Basics
  • Advanced Authentication
  • Ident-based Authentication
    • LAB TASKS
  • Configure PostgreSQL
  • PostgreSQL with TLS
  • PostgreSQL with Kerberos Authentication
  • Securing PostgreSQL with Web Based Applications
Securing Email Systems
  • SMTP Implementations
  • Security Considerations
  • chrooting Postfix
  • Email with GSSAPI/Kerberos Auth
    • LAB TASKS
  • Postfix In a Change Root Environment
2023 Top 20 Training Industry Company - IT Training

Need Help?

Call us at 877-206-0106 or e-mail us at info@learnquest.com

Personalized Solutions

Need a personalized solution for your Training? Contact us, and one of our training advisors will help you find the best solution.

Contact Us

Need Help?

Do you have a question about the courses, instruction, or materials covered? Do you need help finding which course is best for you? We are here to help!

Talk to us

20% Off All AI Training Courses

Achieve more with AI-powered tools and strategies.

PROMO CODE: AI20
VALID THROUGH APRIL 30, 2024

20% Off All AI Training Courses

Self-Paced Training Info

Learn at your own pace with anytime, anywhere training

  • Same in-demand topics as instructor-led public and private classes.
  • Standalone learning or supplemental reinforcement.
  • e-Learning content varies by course and technology.
  • View the Self-Paced version of this outline and what is included in the SPVC course.
  • Learn more about e-Learning

Course Added To Shopping Cart

bla

bla

bla

bla

bla

bla

Self-Paced Training Terms & Conditions

??spvc-wbt-warning??
??group-training-form-area??
??how-can-we-help-you-area??
??personalized-form-area??
??request-quote-area??

Sorry, there are no classes that meet your criteria.

Please contact us to schedule a class.
Close

self-paced
STOP! Before You Leave

Save 0% on this course!

Take advantage of our online-only offer & save 0% on any course !

Promo Code skip0 will be applied to your registration

Close
Nothing yet
here's the message from the cart

To view the cart, you can click "View Cart" on the right side of the heading on each page
Add to cart clicker.

Purchase Information

??elearning-coursenumber?? ??coursename??
View Cart

Need more Information?

Speak with our training specialists to continue your learning journey.

 

Delivery Formats

Close

By submitting this form, I agree to LearnQuest's Terms and Conditions

heres the new schedule
This website uses third-party profiling cookies to provide services in line with the preferences you reveal while browsing the Website. By continuing to browse this Website, you consent to the use of these cookies. If you wish to object such processing, please read the instructions described in our Privacy Policy.
Your use of this LearnQuest site affirms your consent to our use of session and persistent cookies to track how you use our website.