Ziele- Identify ways in which an Intrusion Detection System (IDS) works, ways to configure Snort, and key aspects of PortSentry. - Identify key security vulnerabilities in a Linux system, methods for securing network services, and features of secure shell (SSH). - Identify features of algorithms used for encrypting passwords, password controls that enforce strong passwords, and fields used for configuring password aging settings.
AnforderungenThe audience includes Professionals who want to certify their technical knowledge in basic installation, operation and troubleshooting for Linux operating systems.
TitelKurs 16263 - CompTIA Linux+ 2004: Security
InhaltCourse Overview
This series covers basic installation, operation, and troubleshooting operating systems on workstations and servers. The learner will be able to explain fundamental open source resources/licenses, demonstrate knowledge of user administration, understand file permissions/software configurations and manage local storage devices and network protocols.
Deployment Options
Self-Study
Total Learning Time
4 hours
Objectives
Unit 1: User Security 2 hours
- Identify features of algorithms used for encrypting passwords.
- Identify password controls that enforce strong passwords.
- Identify fields used for configuring password aging settings.
- Identify characteristics of the Pluggable Authentication Modules (PAM) facility.
- Identify features of the Pluggable Authentication Module (PAM) modules.
- Identify features of the pam_limits module in the Pluggable Authentication Module (PAM) facility.
- Identify key aspects of removing user accounts.
- Identify methods for disabling logins.
- Identify considerations for providing appropriate access to system resources.
- Identify features of the sudo command.
Unit 2: System Security Settings 1 hour
- Identify key security vulnerabilities in a Linux system.
- Identify methods for securing network services.
- Identify features of secure shell (SSH).
- Identify access modes for manipulating file permissions.
- Identify utilities for monitoring the integrity of files on a system.
Unit 3: Surveillance and Defense 1 hour
- Identify ways in which an Intrusion Detection System (IDS) works.
- Identify ways to configure Snort.
- Identify key aspects of PortSentry.
- Identify key aspects of Linux Intrusion Detection System (LIDS).
- Identify key aspects of IP filtering.
- Identify options for configuring SuSEfirewall2.
- Identify key aspects of log and accounting files.
Course Access
Each student has access to the course for a period of 6 months from the day of enrollment in the course.
Ähnliche angebote die in bezug zu ihrer anfrage "linux" stehen