Linux Operating System Security
|
|
|
- Jonas Marshall
- 10 years ago
- Views:
Transcription
1 Linux Operating System Security Kenneth Ingham and Anil Somayaji September 29, Course overview This class is for students who want to learn how to configure systems to be secure, test the security of systems, and/or and manage the system more securely. 2 Course objectives Know how to work with a network mapping tool and how to control what it discovers. Know how to work with penetration testing systems and how to reduce their threat. Understand network security issues and how to control network access. Learn about some of the intrusion detection systems available. Understand how the use of cryptography can improve system security, including topics such as VPNs, SSL/TLS, and OpenSSH. Understand local operating system security issues, such as logging, file permissions, password security, and the setuid bit. 3 Student background If you are attending this class, then we assume that You should have a basic familiarity with Linux system administration. Specifically: When a lab says, install the RPM foo.rpm or install the package in foo.tar.gz, you should understand what this means and how to do it. You should understand Unix file permissions, how they work, and how you change them. You should understand how to create users and the parts of a user account. 1
2 You should understand the process the system goes through when it boots. Knowledge of shell programming will help you understand the system startup scripts, etc. If you know regular expressions, you will be able to make better use of the various tools that use them for searching. (For optional kernel chapter) You should understand how to build a new kernel (although the class notes will give some guidance on this topic). 4 Logistics The class lasts three days. Fedora Core 4 The class uses the following software: Apache web server Bastille Linux RPM CentOS 5.x or Red Hat Enterprise 5.x Firefox (on Linux distribution but needed for Windows) GnuPG IP Tables and associated kernel modules and any GUI config tools. Kernel sources from kernel.org or distribution LIDS distribution to match the kernel OpenSSL command-line utilities PAM Perl-Tk and Perl-Curses RPMs TCP wrappers aide (on OS distribution) bzip2 chattr chmod find fuser iptraf (if covered in this class) logger logrotate lsattr lsof mke2fs mount named manual page; a web browser with Internet access nessus client and server either installed or distribution files available netstat 2
3 nmap nmap (on distribution media) portsentry (installed or distribution files) snort installed or distribution files socklist sshd ssh stunnel version 4.0 sudo syslogd telnet (client) umount xinetd xinetd or inetd pam wheel.so a DHCP and DNS server for the class a /test filesystem (size not critical) for mounting nosuid and/or nodev. an NIS server on the instructor machine with an account the students will log into (if this class covers NIS) ipsec-tools static IP addresses (these do not need to be routable) No class network information specified. The class needs a web server for the class web site. The instructor s laptop may be this web server; otherwise the machine provided in the classroom for the instructor is a good choice. This machine obviously will need web server software installed. 5 Class outline 1. Introduction (Lecture: 15; Lab: 0) (a) Class Introductions (b) Class Logistics i. Class schedule ii. Breaks iii. Question policy iv. Break room and restroom locations v. Assumptions about your background (c) Typographic conventions (d) What the class covers 2. General Security Issues (Lecture: 25; Lab: 30) (a) General OS security 3
4 i. Physical security is paramount ii. Security is a process, not a product iii. Fewest services/minimal functionality iv. Least privilege v. Compartmentalization vi. Defense in depth (b) Patches and keeping current (c) Security myths i. We have a firewall, the attackers cannot get to this machine ii. I use anti-virus software; my machine does not have any malware (d) Class software 3. Logging (Lecture: 30; Lab: 35) (a) Overview (b) syslogd i. syslog.conf ii. Facilities iii. Severity Levels iv. Actions (c) Log file rotation i. logrotate directives (d) Utilities to assist with log files 4. Authentication (Lecture: 45; Lab: 45) (a) Password cracking (b) PAM i. Example (c) Root access (d) sudo i. sudo configuration (e) nsswitch.conf (f) Kerberos i. Quick Overview ii. Session Protocol iii. Setting up a Kerberos server iv. Setting up a Kerberos client (g) LDAP 4
5 i. Setting up an LDAP server ii. Using LDAP as a client (h) Summary (i) Lab 5. Local security issues (Lecture: 20; Lab: 60) (a) Disk partitioning (b) Setuid files (c) The sticky bit on a directory (d) Local security scanners i. rpm verification A. Limits of rpm verification 6. nmap and network mapping (Lecture: 20; Lab: 40) (a) nmap overview (b) Using nmap (c) netstat (d) lsof and fuser 7. Penetration testing (Lecture: 15; Lab: 60) (a) Testing for security (b) nessus i. Installing and running nessus (c) Other non-commercial penetration testing tools (d) Commercial penetration testing tools 8. Network access control (Lecture: 50; Lab: 60) (b) TCP wrappers (c) xinetd (d) IP Tables i. OS details ii. Basic IP tables commands iii. Rules iv. iptables examples (e) GUI configuration tools (f) Troubleshooting 5
6 (g) Summary 9. Intrusion Detection Overview (Lecture: 25; Lab: 35) (b) Types of Intrusion Detection Systems i. Input data stream ii. Data analysis method iii. Response strategy iv. Honeypots and darknets (c) Evaluating IDS systems (d) Comparing IDS strategies (e) IDS Overview Lab 10. Host-based Intrusion Detection Systems (Lecture: 20; Lab: 65) (b) aide i. Using aide (c) tripwire i. Configuring Tripwire (d) portsentry i. Installing and configuring portsentry (e) Other open source host-based IDSs (f) Commercial products (g) Summary 11. Network Intrusion Detection Systems (Lecture: 15; Lab: 45) (b) snort i. Installing snort ii. Configuring snort iii. Running snort (c) Other NIDSs (d) Lab 12. SELinux (Lecture: 35; Lab: 30) (a) Overview of SELinux (b) Discretionary versus mandatory access control (c) SELinux vocabulary (d) Security contexts i. Overview 6
7 ii. Example iii. Processes iv. Files and filesystems (e) Security policies (f) Enabling SELinux (g) Working with file contexts (h) Handling SELinux denials (i) SELinux notes (j) Summary (k) Lab 13. Cryptography Overview (Lecture: 70; Lab: 55) i. Cryptographic Applications ii. Open design (b) Cryptographic Primitives i. Cryptographic hash functions ii. Symmetric key encryption iii. Public key encryption (c) Digital signatures (d) Public Key Management i. The Problem ii. Certificates iii. Trust Models iv. Example: PGP/GnuPG v. Example: SSL/TLS vi. Overview A. The server B. The client (e) Random numbers (f) Parameter sizes (g) Insecure Cryptography i. Key management errors (h) Do not innovate in cryptography (i) Summary (j) Lab 14. Cryptographic Tools (Lecture: 40; Lab: 45) (b) GnuPG digital signatures i. Example: Obtaining a key from a key server ii. Verifying PGP signatures 7
8 iii. Verifying package signatures with rpm (c) ssh i. Public key authentication ii. Tunneling iii. ssh client issues iv. ssh server issues (d) Lab 15. SSL and TLS (Lecture: 30; Lab: 60) (a) Overview (b) The server (c) The client (d) OpenSSL (e) SSL/TLS configuration for servers i. Apache ii. SMTP AUTH and STARTTLS iii. stunnel 4.0 iv. stunnel configuration file (f) SSL/TLS issues in web browsers (g) Important Points 16. IPsec (Lecture: 30; Lab: 60) Appendices (b) How IPsec works (c) IPsec implementations for Linux (d) ipsec-tools (e) IPsec issues (f) VPN Security (g) Summary A. Review of networking concepts (Lecture: 15; Lab: 0) (a) ISO model of networking i. Network layer addressing (b) UDP (c) TCP i. TCP connection setup (d) ICMP B. Loop filesystem (Lecture: 0; Lab: 0) 8
9 (a) Loop device C. Security packages and distributions (Lecture: 20; Lab: ) (a) Bastille Linux (b) LIDS (c) OpenWall (d) Trustix Secure Linux (e) Debian (f) OpenBSD (g) Lab D. Kernel configuration options (optional) (Lecture: 20; Lab: 105) (a) Kernel modules (b) lcap (c) Lab E. Network Configuration (Lecture: 30; Lab: 45) (a) Network configuration i. DHCP client configuration ii. Static network configuration (b) DNS lookups i. /etc/resolv.conf ii. host (c) Virtual network interfaces (d) mii-tool and ethtool i. Examples (e) system-config-network (f) Troubleshooting (g) Summary F. Network services (Lecture: 30; Lab: 45) (a) xinetd (b) ssh i. Public key authentication ii. Tunneling (c) NFS i. Client ii. Server (d) Automounter (e) Troubleshooting (f) Summary (g) Lab 9
Linux System Administration on Red Hat
Linux System Administration on Red Hat Kenneth Ingham September 29, 2009 1 Course overview This class is for people who are familiar with Linux or Unix systems as a user (i.e., they know file manipulation,
Advanced Linux System Administration on Red Hat
Advanced Linux System Administration on Red Hat Kenneth Ingham September 29, 2009 1 Course overview This class is for people who are familiar with basic Linux administration (i.e., they know users, packages,
Designing and Coding Secure Systems
Designing and Coding Secure Systems Kenneth Ingham and Anil Somayaji September 29, 2009 1 Course overview This class covers secure coding and some design issues from a language neutral approach you can
LINUX SECURITY COOKBOOK. DanieIJ. Barren, Richard E Silverman, and Robert G. Byrnes
LINUX SECURITY COOKBOOK DanieIJ. Barren, Richard E Silverman, and Robert G. Byrnes ORELLY Beijing " Cambridge " Farnham " Koln " Paris " Sebastopol " Taipei - Tokyo Table of Contents Preface............,....................................................A
GL550 - Enterprise Linux Security Administration
GL550 - Enterprise Linux Security Administration This highly technical course focuses on properly securing machines running the Linux operating systems. A broad range of general security techniques such
COURCE TITLE DURATION LPI-202 Advanced Linux Professional Institute 40 H.
COURCE TITLE DURATION LPI-202 Advanced Linux Professional Institute 40 H. IMPLEMENTING A WEB SERVER Apache Architecture Installing PHP Apache Configuration Files httpd.conf Server Settings httpd.conf Main
GL254 - RED HAT ENTERPRISE LINUX SYSTEMS ADMINISTRATION III
QWERTYUIOP{ GL254 - RED HAT ENTERPRISE LINUX SYSTEMS ADMINISTRATION III This GL254 course is designed to follow an identical set of topics as the Red Hat RH254, RH255 RHCE exam prep courses with the added
SCP - Strategic Infrastructure Security
SCP - Strategic Infrastructure Security Lesson 1 - Cryptogaphy and Data Security Cryptogaphy and Data Security History of Cryptography The number lock analogy Cryptography Terminology Caesar and Character
HP Education Services
HP Education Services HP-UX Security (H3541S) Concerned about system security? HP s updated and enhanced HP-UX Security course can help you secure your systems and mitigate risks. Designed for experienced
GL-550: Red Hat Linux Security Administration. Course Outline. Course Length: 5 days
GL-550: Red Hat Linux Security Administration Course Length: 5 days Course Description: This highly technical course focuses on properly securing machines running the Linux operating systems. A broad range
ENTERPRISE LINUX SECURITY ADMINISTRATION
ENTERPRISE LINUX SECURITY ADMINISTRATION COURSE DESCRIPTION: This highly technical course focuses on properly securing machines running the Linux operating systems. A broad range of general security techniques
CS 356 Lecture 25 and 26 Operating System Security. Spring 2013
CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control
Getting Started in Red Hat Linux An Overview of Red Hat Linux p. 3 Introducing Red Hat Linux p. 4 What Is Linux? p. 5 Linux's Roots in UNIX p.
Preface p. ix Getting Started in Red Hat Linux An Overview of Red Hat Linux p. 3 Introducing Red Hat Linux p. 4 What Is Linux? p. 5 Linux's Roots in UNIX p. 6 Common Linux Features p. 8 Primary Advantages
ENTERPRISE LINUX SECURITY ADMINISTRATION
ENTERPRISE LINUX SECURITY ADMINISTRATION This highly technical course focuses on properly securing machines running the Linux operating systems. A broad range of general security techniques such as packet
Network Security Foundations
Network Security Foundations Matthew Strebe O San SrBBC Francisco London Introduction xv Chapter 1 Security Principles 1 Why Computers Aren't Secure 2 The History of Computer Security 4-1945 5 1945-1955
3 Days Course on Linux Firewall & Security Administration
PROFESSIONAL TRAINING COURSE 3 Days Course on Linux Firewall & Security Administration About the Course The course will teach students how to use local and network security. This is a course for those
Small Systems Solutions is the. Premier Red Hat and Professional. VMware Certified Partner and Reseller. in Saudi Arabia, as well a competent
T R A I N I N G C O U R S E S T H E # 1 L I N U X A N D O P E N S O U R C E P R O V I D E R I N S A U D I A R A B I A Introd uction to Linux Administra tion Adva nce Linux Ad ministrati on Linux Identity
Description: Objective: Attending students will learn:
Course: Introduction to Cyber Security Duration: 5 Day Hands-On Lab & Lecture Course Price: $ 3,495.00 Description: In 2014 the world has continued to watch as breach after breach results in millions of
RH033 Red Hat Linux Essentials or equivalent experience with Red Hat Linux..
RH131 Red Hat Linux System Administration Course Summary For users of Linux (or UNIX) who want to start building skills in systems administration on Red Hat Linux, to a level where they can attach and
Linux Server Configuration Guidelines
Linux Server Configuration Guidelines This document is meant to be a living document and intended to accompany more detailed, step- by- step resources. Suggestions in this document are taken from administrators
Beginning OpenVPN 2.0.9
Beginning OpenVPN 2.0.9 Build and integrate Virtual Private Networks using OpenVPN Markus Feilner Norbert Graf PUBLISHING BIRMINGHAM - MUMBAI Preface 1 Chapter 1: VPN Virtual Private Network 7 Broadband
Security + Certification (ITSY 1076) Syllabus
Security + Certification (ITSY 1076) Syllabus Course: ITSY 1076 Security+ 40 hours Course Description: This course is targeted toward an Information Technology (IT) professional who has networking and
INFORMATION SECURITY TRAINING CATALOG (2015)
INFORMATICS AND INFORMATION SECURITY RESEARCH CENTER CYBER SECURITY INSTITUTE INFORMATION SECURITY TRAINING CATALOG (2015) Revision 3.0 2015 TÜBİTAK BİLGEM SGE Siber Güvenlik Enstitüsü P.K. 74, Gebze,
Linux Troubleshooting. 5 Days
QWERTYUIOP{ Linux Troubleshooting 5 Days The class is designed to give Linux administrators experience with both common and uncommon system problems. The course is based on the idea that the best way to
LINUX NETWORK SECURITY
LINUX NETWORK SECURITY PETER G. SMITH CHARLES CHARLES RIVER MEDIA, INC. Hingham, Massachusetts Contents Preface xvii 1 Introduction: The Need For Security 1 1.1 Introducing the Enemy 1 The Hacker Myth
Red Hat Linux Administration II Installation, Configuration, Software and Troubleshooting
Course ID RHL200 Red Hat Linux Administration II Installation, Configuration, Software and Troubleshooting Course Description Students will experience added understanding of configuration issues of disks,
Deploying Ubuntu Server Edition. Training Course Overview. (Ubuntu 10.04 LTS)
Deploying Ubuntu Server Edition Training Course Overview (Ubuntu 10.04 LTS) 1. Deploying Ubuntu Server Edition Course Overview About the Course and Objectives This advanced 40-hour course will provide
Host Hardening. OS Vulnerability test. CERT Report on systems vulnerabilities. (March 21, 2011)
Host Hardening (March 21, 2011) Abdou Illia Spring 2011 CERT Report on systems vulnerabilities Source: CERT Report @ http://www.kb.cert.org/vuls/bymetric 2 OS Vulnerability test Source: http://www.omninerd.com/articles/2006_operating_system_vulnerabilit
Table of Contents. Introduction. Audience. At Course Completion. Prerequisites
Table of Contents Introduction Audience At Course Completion Prerequisites Certified Professional Exams Student Materials Course Outline Introduction This in-depth, 5-day course helps students acquire
information security and its Describe what drives the need for information security.
Computer Information Systems (Forensics Classes) Objectives for Course Challenges CIS 200 Intro to Info Security: Includes managerial and Describe information security and its critical role in business.
NETWORK SECURITY HACKS *
NETWORK SECURITY HACKS * Andrew %pckhart Ji O'REILLY* Beijing Cambridge Farnham Koln Paris Sebastopol Taipei Tokyo Contents Credits Preface ix xi Chapter 1. Unix Host Security 1 1. Secure Mount Points
Nessus Agents. October 2015
Nessus Agents October 2015 Table of Contents Introduction... 3 What Are Nessus Agents?... 3 Scanning... 4 Results... 6 Conclusion... 6 About Tenable Network Security... 6 2 Introduction Today s changing
Advanced Linux System Administration Knowledge GNU/LINUX Requirements
Advanced Linux System Administration Knowledge GNU/LINUX Requirements Duration: 112Hours / 28 Classes (4hrs each class Including Theory & Lab Session) (2 Classes/ Week) Class Topic Duration Class 1 History
Ethical Hacking and Attack Tools
Ethical Hacking and Attack Tools Kenneth Ingham September 29, 2009 1 Course overview Attackers have at their disposal a large collection of tools that aid their exploiting systems. If you plan to defend
OnCommand Performance Manager 1.1
OnCommand Performance Manager 1.1 Installation and Setup Guide For Red Hat Enterprise Linux NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501
Open Source Security: Opportunity or Oxymoron?
Open Source Security: Opportunity or Oxymoron? by George Lawton Presented by Eduard Kuziner COMP 595 SEC CSUN May 2002 1 Outline 1. What is Open Source? 2. Open Source Pros and Cons 3. Current Projects
Linux Network Security
Linux Network Security Course ID SEC220 Course Description This extremely popular class focuses on network security, and makes an excellent companion class to the GL550: Host Security course. Protocols
GLS250 "Enterprise Linux Systems Administration"
GLS250 "Enterprise Linux Systems Administration" Intended for students already comfortable with working in the Unix environment, this in-depth course helps students acquire the variety of skills needed
Security Advice for Instances in the HP Cloud
Security Advice for Instances in the HP Cloud Introduction: HPCS protects the infrastructure and management services offered to customers including instance provisioning. An instance refers to a virtual
Linux VPS with cpanel. Getting Started Guide
Linux VPS with cpanel Getting Started Guide First Edition October 2010 Table of Contents Introduction...1 cpanel Documentation...1 Accessing your Server...2 cpanel Users...2 WHM Interface...3 cpanel Interface...3
Networking: EC Council Network Security Administrator NSA
coursemonster.com/uk Networking: EC Council Network Security Administrator NSA View training dates» Overview The EC-Council's NSA certification looks at network security from a defensive view. The NSA
Testing for Security
Testing for Security Kenneth Ingham September 29, 2009 1 Course overview The threat that security breaches present to your products and ultimately your customer base can be significant. This course is
TABLE OF CONTENTS NETWORK SECURITY 2...1
Network Security 2 This document is the exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors
Introduction Open Source Security Tools for Information Technology Professionals
Introduction Open Source Security Tools for Information Technology Professionals School of Professional Studies (SPS) The City University of New York (CUNY) Aron Trauring Adjunct Professor CEO, Zoteca
IT6203 Systems & Network Administration. (Optional)
Systems & Network Administration (Optional) INTRODUCTION This is one of the Optional courses designed for Semester 6 of the Bachelor of Information Technology Degree program. This course on Systems & Network
Secure Network Filesystem (Secure NFS) By Travis Zigler
Secure Network Filesystem (Secure NFS) By Travis Zigler Overview of Secure NFS Problems with NFS Security of Basic NFS Configurations Securing NFS with SSH Tutorial Securing NFS with SSL Overview Conclusions
Guide to the Secure Configuration of Red Hat Enterprise Linux 5
Guide to the Secure Configuration of Red Hat Enterprise Linux 5 Revision 2 December 20, 2007 Operating Systems Division Unix Team of the Systems and Network Analysis Center National Security Agency 9800
Viking VPN Guide Linux/UNIX
Viking VPN Guide Linux/UNIX Table Of Contents 1 : VPN Questions answered 2 : Installing the Linux Client 3 : Connecting with the Linux Client 4 : Reporting Problems Version 1.0 : 10/27/2010 Information
2016 TÜBİTAK BİLGEM Cyber Security Institute
2016 Revision 5.0 2016 TÜBİTAK BİLGEM Cyber Security Institute 1 ... 3 1. Information Security Awareness for End Users... 4 2. Information Security Awareness for Managers... 5 3. Social Engineering: Attack
INFORMATION SECURITY TRAINING CATALOG (2016)
INFORMATICS AND INFORMATION SECURITY RESEARCH CENTER CYBER SECURITY INSTITUTE INFORMATION SECURITY TRAINING CATALOG (2016) Revision 4.0 2015 TÜBİTAK BİLGEM SGE Siber Güvenlik Enstitüsü P.K. 74, Gebze,
Chapter 11 Phase 5: Covering Tracks and Hiding
Chapter 11 Phase 5: Covering Tracks and Hiding Attrition Web Site Contains an archive of Web vandalism attacks http://www.attrition.org/mirror/attrition Most attackers, however, wish to keep low profile
Nixu SNS Security White Paper May 2007 Version 1.2
1 Nixu SNS Security White Paper May 2007 Version 1.2 Nixu Software Limited Nixu Group 2 Contents 1 Security Design Principles... 3 1.1 Defense in Depth... 4 1.2 Principle of Least Privilege... 4 1.3 Principle
Network Security and Firewall 1
Department/program: Networking Course Code: CPT 224 Contact Hours: 96 Subject/Course WEB Access & Network Security: Theoretical: 2 Hours/week Year Two Semester: Two Prerequisite: NET304 Practical: 4 Hours/week
Information Security Measures and Monitoring System at BARC. - R.S.Mundada Computer Division B.A.R.C., Mumbai-85
Information Security Measures and Monitoring System at BARC - R.S.Mundada Computer Division B.A.R.C., Mumbai-85 Information Security Approach Secure Network Design, Layered approach, with SPF and Application
Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)
Page 1 of 6 Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) TNCC Cybersecurity Program web page: http://tncc.edu/programs/cyber-security Course Description: Encompasses
Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding
Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding This chapter describes the configuration for the SSL VPN Tunnel Client and for Port Forwarding. When a remote user accesses the SSL VPN
Oracle Linux 7: System Administration Ed 1 NEW
Oracle University Contact Us: Local: 1800 103 4775 Intl: +91 80 40291196 Oracle Linux 7: System Administration Ed 1 NEW Duration: 5 Days What you will learn The Oracle Linux 7: System Administration training
HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD 21015 Course Outline CIS 110 - INTRODUCTION TO UNIX
HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD 21015 Course Outline CIS 110 - INTRODUCTION TO UNIX Course Description: This is an introductory course designed for users of UNIX. It is taught
SSL Tunnels. Introduction
SSL Tunnels Introduction As you probably know, SSL protects data communications by encrypting all data exchanged between a client and a server using cryptographic algorithms. This makes it very difficult,
NETWORK SECURITY (W/LAB) Course Syllabus
6111 E. Skelly Drive P. O. Box 477200 Tulsa, OK 74147-7200 NETWORK SECURITY (W/LAB) Course Syllabus Course Number: NTWK-0008 OHLAP Credit: Yes OCAS Code: 8131 Course Length: 130 Hours Career Cluster: Information
What is included in the ATRC server support
Linux Server Support Services What is included in the ATRC server support Installation Installation of any ATRC Supported distribution Compatibility with client hardware. Hardware Configuration Recommendations
Installing Virtual Coordinator (VC) in Linux Systems that use RPM (Red Hat, Fedora, CentOS) Document # 15807A1-103 Date: Aug 06, 2012
Installing Virtual Coordinator (VC) in Linux Systems that use RPM (Red Hat, Fedora, CentOS) Document # 15807A1-103 Date: Aug 06, 2012 1 The person installing the VC is knowledgeable of the Linux file system
Hervey Allen. Network Startup Resource Center. PacNOG 6: Nadi, Fiji. Security Overview
Hervey Allen Network Startup Resource Center PacNOG 6: Nadi, Fiji Security Overview Security: A Massive Topic Security Viewpoints - Server - Client - Network Securing each overlaps the other Server Client
GSEC GIAC Security. Essentials Certification ONE ALL IN EXAM GUIDE. Ric Messier. Singapore Sydney Toronto
ALL IN ONE GSEC GIAC Security Essentials Certification EXAM GUIDE Ric Messier New York Chicago San Francisco Athens London Madrid Mexico City Milan New Delhi Singapore Sydney Toronto "4 McGraw-Hill Education
Network Defense Specialist. Course Title: Network Defense Specialist: Securing and Troubleshooting Network Operating Systems
Course Title: Network Defense Specialist: Securing and Troubleshooting Network Operating Systems Page 1 of 12 Course Description The Network Defense Series from EC-Council Press is comprised of 5 books
This chapter describes how to set up and manage VPN service in Mac OS X Server.
6 Working with VPN Service 6 This chapter describes how to set up and manage VPN service in Mac OS X Server. By configuring a Virtual Private Network (VPN) on your server you can give users a more secure
EUCIP - IT Administrator. Module 5 IT Security. Version 2.0
EUCIP - IT Administrator Module 5 IT Security Version 2.0 Module 5 Goals Module 5 Module 5, IT Security, requires the candidate to be familiar with the various ways of protecting data both in a single
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
Red Hat Enterprise Linux (RHEL 6) Courses
Red Hat Enterprise Linux (RHEL 6) Courses Red Hat System Administration I * Core Skills (5 days) Advanced Linux Shell Scripting Shell Scripting (bash,ksh93) and awk Programming (3 days) Advanced Red Hat
Intrusion Detection and Prevention: Network and IDS Configuration and Monitoring using Snort
License Intrusion Detection and Prevention: Network and IDS Configuration and Monitoring using Snort This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons
Security Configuration Guide P/N 300-010-493 Rev A05
EMC VPLEX Security Configuration Guide P/N 300-010-493 Rev A05 June 7, 2011 This guide provides an overview of VPLEX security configuration settings, including secure deployment and usage settings needed
Guide to the Secure Configuration of Red Hat Enterprise Linux 5
Guide to the Secure Configuration of Red Hat Enterprise Linux 5 Revision 4.2 August 26, 2011 Operating Systems Division Unix Team of the Systems and Network Analysis Center National Security Agency 9800
Installing and Configuring Websense Content Gateway
Installing and Configuring Websense Content Gateway Websense Support Webinar - September 2009 web security data security email security Support Webinars 2009 Websense, Inc. All rights reserved. Webinar
Specialized Programme on Internetworking Design and LAN WAN Administration
Specialized Programme on Internetworking Design and LAN WAN Administration A. NAME OF INSTITUTE Centre For Development of Advanced Computing B. NAME/TITLE OF THE COURSE C. COURSE DATES WITH DURATION IN
VMware: Advanced Security
VMware: Advanced Security Course Introduction Course Introduction Chapter 01 - Primer and Reaffirming Our Knowledge Primer and Reaffirming Our Knowledge ESX Networking Components How Virtual Ethernet Adapters
CYBERTRON NETWORK SOLUTIONS
CYBERTRON NETWORK SOLUTIONS CybertTron Certified Ethical Hacker (CT-CEH) CT-CEH a Certification offered by CyberTron @Copyright 2015 CyberTron Network Solutions All Rights Reserved CyberTron Certified
Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment
White Paper Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment Cisco Connected Analytics for Network Deployment (CAND) is Cisco hosted, subscription-based
Open Source Security Tools for Information Technology Professionals
Open Source Security Tools for Information Technology Professionals CUNY SPS Course Syllabus Aron Trauring May 23, 2005 (rev October 21, 2005) Course Description Information security is a top priority
Exam Questions SY0-401
Exam Questions SY0-401 CompTIA Security+ Certification http://www.2passeasy.com/dumps/sy0-401/ 1. A company has implemented PPTP as a VPN solution. Which of the following ports would need to be opened
Network Security. Network Packet Analysis
Network Security Network Packet Analysis Module 3 Keith A. Watson, CISSP, CISA IA Research Engineer, CERIAS [email protected] 1 Network Packet Analysis Definition: Examining network packets to determine
Linux Boot Camp. Our Lady of the Lake University Computer Information Systems & Security Department Kevin Barton Artair Burnett
Linux Boot Camp Our Lady of the Lake University Computer Information Systems & Security Department Kevin Barton Artair Burnett Schedule for the Week Schedule for the Week Mon Welcome from Enrollment Management
System Administration: The Complete Reference
ORACLE Oracle Press Oracle Solaris 11 System Administration: The Complete Reference Michael Jang and Harry Foxwell with Christine Tran and Alan Formy-Duval, Contributing Writers Mc Graw Hill New York Chicago
McAfee Firewall Enterprise 8.2.1
Configuration Guide FIPS 140 2 Revision A McAfee Firewall Enterprise 8.2.1 The McAfee Firewall Enterprise FIPS 140 2 Configuration Guide, version 8.2.1, provides instructions for setting up McAfee Firewall
TIME SCHEDULE. 1 Introduction to Computer Security & Cryptography 13
COURSE TITLE : INFORMATION SECURITY COURSE CODE : 5136 COURSE CATEGORY : ELECTIVE PERIODS/WEEK : 4 PERIODS/SEMESTER : 52 CREDITS : 4 TIME SCHEDULE MODULE TOPICS PERIODS 1 Introduction to Computer Security
ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0
ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0 Module 1: Vulnerabilities, Threats, and Attacks 1.1 Fundamental Principles of a Secure Network
RHCSA 7RHCE Red Haf Linux Certification Practice
RHCSA 7RHCE Red Haf Linux Certification Practice Exams with Virtual Machines (Exams EX200 & EX300) "IcGraw-Hill is an independent entity from Red Hat, Inc., and is not affiliated with Red Hat, Inc. in
Unix Network Security
/ UnixNetworkSecuirty-05-2004-CIT-ACDS Unix Network Security Mehmet Balman / Introduction A machine connected to phone lines or local network has the potential for intruders. Therefore security aspect
Computer Security: Principles and Practice
Computer Security: Principles and Practice Chapter 23 Linux Security EECS 710 Professor: Dr. Hossein Saiedian Presented by Ankit Agarwal 1 Outline Introduction Linux Security Model Linux File-System Security
Ethical Hacking and Information Security. Foundation of Information Security. Detailed Module. Duration. Lecture with Hands On Session: 90 Hours
Ethical Hacking and Information Security Duration Detailed Module Foundation of Information Security Lecture with Hands On Session: 90 Hours Elements of Information Security Introduction As technology
Ficha técnica de curso Código: IFCAD111
Curso de: Objetivos: Managing Cisco Network Security: Building Rock-Solid Networks Dar a conocer la filosofía CISCO desde el punto de vista de la seguridad y como construir una red solidad. Como hacer
Contents. Part 1 SSH Basics 1. Acknowledgments About the Author Introduction
Acknowledgments xv About the Author xvii Introduction xix Part 1 SSH Basics 1 Chapter 1 Overview of SSH 3 Differences between SSH1 and SSH2 4 Various Uses of SSH 5 Security 5 Remote Command Line Execution
1 Scope of Assessment
CIT 380 Project Network Security Assessment Due: April 30, 2014 This project is a security assessment of a small group of systems. In this assessment, students will apply security tools and resources learned
Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline
Course Number: SEC 150 Course Title: Security Concepts Hours: 2 Lab Hours: 2 Credit Hours: 3 Course Description: This course provides an overview of current technologies used to provide secure transport
Cyber Exercises, Small and Large
First International Conference on Cyber Crisis Cooperation: Cyber Exercises 27 June 2012 Cyber Exercises, Small and Large Commander Mike Bilzor Computer Science Department U.S. Naval Academy Annpolis,
