|Course Title||Linux Security – Advanced
|Emploi-Québec fee (taxes incl.)
|General Public fee (taxes incl.)
|Schedule||Tuesday & Thursday
6 p.m. to 9 p.m.
|Prerequisites||Knowledge of Linux operating system
It is not necessary to complete Linux Security – Introduction prior to taking this course
|Target Audience||I.T. professionals|
|Location||Brittain Hall – lab to be determined|
NB: This is a non-credit course. Certificate provided for all participants who have completed 80% of course hours.
Recommended textbook: No textbook is required for this course.
Please note that the focus of this course is on network security.
This course will teach you everything you need to know about Linux security. It begins with a review of Linux command line and operating system components. This is a practical, hands on course that will elevate your understanding of Linux security to an entirely new level.
The first focus is on standard Unix security mechanisms such as users, groups, file and directory permissions.
Further topics include: ACL (Access Control Lists – similar to MS Windows security permissions) and SELinux (Security Enhanced Linux), IPTables firewall setup for workstations, servers and routers using UFW and FWBuilder. As well as: the 3 types of cryptographic algorithms and their practical use, using SSL/TLS to secure Apache, FTP and other network servers, less known powerful security features of SSH, Intrusion Detection Kits, and common mistakes made by Linux administrators that often result in compromised security.
Topics to be covered include:
- Quick review of Linux command line and OS components
- Apache web server security – directory access control, logs
- Network layers and their application to network security
- Tools for “snooping” on network traffic and what can we see with them
- SSL certificates and Apache
- FTP server security, including SSL use, limiting users to their home directories only
- SFTP: SSH as FTP server and client, limiting users to their home directories only
- Virtual Private Networks – protocols, server setup, client setup
- Network exploits, buffer overflows, viruses, worms – how they work, detection, prevention, removal
- IPTables firewall – design, understanding and practical use
- Firewall builder – create a firewall by drag-and-drop
- Intrusion Detection systems (IDS), Intrusion Prevention Systems (IPS)