3 Days Course on Linux Firewall & Security Administration



Similar documents
COURCE TITLE DURATION LPI-202 Advanced Linux Professional Institute 40 H.

5 Days Course on Oracle WebLogic Server 11g: Administration Essentials

ENTERPRISE LINUX SECURITY ADMINISTRATION

HP Education Services

Linux Operating System Security

GL550 - Enterprise Linux Security Administration

LINUX NETWORK SECURITY

Small Systems Solutions is the. Premier Red Hat and Professional. VMware Certified Partner and Reseller. in Saudi Arabia, as well a competent

GL254 - RED HAT ENTERPRISE LINUX SYSTEMS ADMINISTRATION III

ENTERPRISE LINUX SECURITY ADMINISTRATION

GL-550: Red Hat Linux Security Administration. Course Outline. Course Length: 5 days

Prerequisites: Fundamentals of Networking, Knowledge of Operating Systems

Introduction Open Source Security Tools for Information Technology Professionals

Network Security and Firewall 1

What is included in the ATRC server support

SCP - Strategic Infrastructure Security

CYBERTRON NETWORK SOLUTIONS

CRYPTUS DIPLOMA IN IT SECURITY

INFORMATION SECURITY TRAINING CATALOG (2015)

Self Service Penetration Testing

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

RH033 Red Hat Linux Essentials or equivalent experience with Red Hat Linux..

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Open Source Security Tools for Information Technology Professionals

NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

Getting Started in Red Hat Linux An Overview of Red Hat Linux p. 3 Introducing Red Hat Linux p. 4 What Is Linux? p. 5 Linux's Roots in UNIX p.

CISCO IOS NETWORK SECURITY (IINS)

Internet infrastructure. Prof. dr. ir. André Mariën

Manage a Firewall Using your Plesk Control Panel Contents

Högskolan i Halmstad Sektionen för Informationsvetenskap, Data- Och Elektroteknik (IDÉ) Ola Lundh. Name (in block letters) :

information security and its Describe what drives the need for information security.

Information Security Measures and Monitoring System at BARC. - R.S.Mundada Computer Division B.A.R.C., Mumbai-85

Track 2 Workshop PacNOG 7 American Samoa. Firewalling and NAT

Securing Cisco Network Devices (SND)

Hervey Allen. Network Startup Resource Center. PacNOG 6: Nadi, Fiji. Security Overview

How To Protect Your Network From A Hacker Attack On Zcoo Ip Phx From A Pbx From An Ip Phone From A Cell Phone From An Uniden Ip Pho From A Sim Sims (For A Sims) From A

City University of Hong Kong. Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 2012/2013

Design and Configuration of a Network Security and Forensics Lab

Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0

Implementing and Supporting Microsoft Windows XP Professional

ENTERPRISE LINUX NETWORKING SERVICES

Implementing and Administering Security in a Microsoft Windows Server 2003 Network

GL275 - ENTERPRISE LINUX NETWORKING SERVICES

How To Set Up An Ip Firewall On Linux With Iptables (For Ubuntu) And Iptable (For Windows)

IT6203 Systems & Network Administration. (Optional)

Deploying Ubuntu Server Edition. Training Course Overview. (Ubuntu LTS)

Linux Server Support by Applied Technology Research Center. Proxy Server Configuration

Implementing Cisco IOS Network Security v2.0 (IINS)

GL-275: Red Hat Linux Network Services. Course Outline. Course Length: 5 days

"Charting the Course... Enterprise Linux Networking Services Course Summary

Firewall Builder Architecture Overview

10972-Administering the Web Server (IIS) Role of Windows Server

Networking: EC Council Network Security Administrator NSA

INFORMATION SECURITY TRAINING CATALOG (2016)

NETWORK SECURITY HACKS

Tim Bovles WILEY. Wiley Publishing, Inc.

Host Hardening. OS Vulnerability test. CERT Report on systems vulnerabilities. (March 21, 2011)

Firewall implementation and testing

Principles of Information Assurance Syllabus

Chapter 1 The Principles of Auditing 1

Linux VPS with cpanel. Getting Started Guide

ENTERPRISE LINUX NETWORKING SERVICES

IDS 4.0 Roadshow. Module 1- IDS Technology Overview. 2003, Cisco Systems, Inc. All rights reserved. IDS Roadshow

Customized Data Exchange Gateway (DEG) for Automated File Exchange across Networks

Focus on Security. Keeping the bad guys out


Advanced Linux System Administration Knowledge GNU/LINUX Requirements

Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline

Cisco Certified Security Professional (CCSP)

Network Defense Specialist. Course Title: Network Defense Specialist: Securing and Troubleshooting Network Operating Systems

Network Security. by David G. Messerschmitt. Secure and Insecure Authentication. Security Flaws in Public Servers. Firewalls and Packet Filtering

Linux Networking Basics

SECURE YOUR NETWORK WITH FIREWALL BUILDER

2016 TÜBİTAK BİLGEM Cyber Security Institute

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Implementing Cisco IOS Network Security

Open Source Security Tools

Linux Network Security

Network Security. Mike Trice, Network Engineer Richard Trice, Systems Specialist Alabama Supercomputer Authority

Firewalls. Pehr Söderman KTH-CSC

Ethical Hacking Course Layout

Hands-on Hacking Unlimited

A REVIEW OF METHODS FOR SECURING LINUX OPERATING SYSTEM

By Jascha Wanger

Implementing, Managing and Maintaining a Microsoft Windows Server 2003 Network Infrastructure: Network Services Course No.

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

Information Security. Training

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak DryView 8150 Imager Release 1.0.

Administering Windows Server 2012

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak Medical Image Manager (MIM) Version 6.1.

NETWORK SECURITY HACKS *

The current version installed on your server is el6.x86_64 and it's the latest available.

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0

Windows 7, Enterprise Desktop Support Technician

Table Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10

Transcription:

PROFESSIONAL TRAINING COURSE 3 Days Course on Linux Firewall & Security Administration

About the Course The course will teach students how to use local and network security. This is a course for those responsible for the configuration, managing and setup of Linux system security e.g. kernel security, data security, file system security, password security, ACLs, SELinux, network services security, TCPWrappers, Linux-based firewall with iptables and Virtual Private Networking. Goal Upon completion of this course, students should be able to: Discuss network and local system security and place the firewall therein Install and harden Linux system System monitoring Understand PAM authentication Securing the kernel, file systems and data Manage TCPWrappers for securing services SELinux administration Configure iptables packet filtering and Network Address Translation Configure Virtual Private Networking Configure and use hacker s tools Detect and counter firewall intrusions Pre-Requisites Have an experience using Linux Operating System and have basic programming skills. Who Should Attend This course is designed for experienced Linux and networking professionals who are responsible for configuring and maintaining security for Linux systems. System / Network administrators & support people, programmers and prospective Linux power users, looking to harness the power of task automation through shell scripting. Course Settings Venue/Date Refer to Training Calendar Timings 0900-1700 Inclusive Certificates and notes Course Fees Contact us at Timings 0900-1700 (3 Days) Audience Level IT Officer, System and Network administrators Basic-to-Intermediate

Linux Firewall and Security Administration - Schedule Day 1 09.00am 10.00am Introduction to Security and Firewall Definition of security Security Policy Type of attack Principles of security Security practices Hackers, crackers and script kiddies Motivation of hackers and crackers What you have to lose What is a firewall? Position of a firewall Virtual Private Networking Network security techniques and usage PAM Authentication Authentication PAM Password security Password policy Utilities and authentication PAM troubleshooting System Monitoring Introduction to system monitoring File system analysis System log file Log file analysis Monitoring process Process monitoring utilities System activity reporting Limiting process Process accounting tools Installing and Securing Linux Installing Linux Applying patches Kernel recompilation Hardening Linux User account considerations Disabling services File system Hardening Access Control Lists (ACLs) Kernel tuning and configuration options

09.00am 10.00am 09.00am 10.00am Day 2 Securing Services System V startup control Securing the services TCPWrappers configuration Securing xinetd Securing DNS Securing Mail Securing Data Fundamentals of encryption The need for encryption Symmetric encryption Asymmetric encryption Public Key Infrastructure (PKI) Digital certificates SELinux Administration Security Enhanced Linux (SELinux) SELinux targeted policy SELinux installation options and control Controlling SELinux SELinux contexts Troubleshooting SELinux Day 3 Securing Network Packet filtering overview Network Address Translation Kernel-level firewall implementation with iptables Protection against spoofed addresses IP masquerading FWBuilder Virtual Private Networking Virtual Private Network concepts Virtual Private Network solutions IPSec Hacker s Tools Metasploit Ethereal Nmap Nessus

More Information 19-2, Jalan PGN 1A/1, Pinggiran Batu Caves, Tel: 03-61880601/Fax: 03-61880602 To register, please email to or fax the registration form to 03-61880602, we will contact you for further action.