-
Ziele
- Identify ways in which an Intrusion Detection System (IDS) works, ways to configure Snort, and key aspects of PortSentry. - Identify key security vulnerabilities in a Linux system, methods for securing network services, and features of secure shell (SSH). - Identify features of algorithms used for encrypting passwords, password controls that enforce strong passwords, and fields used for configuring password aging settings.
-
Anforderungen
The audience includes Professionals who want to certify their technical knowledge in basic installation, operation and troubleshooting for Linux operating systems.
-
Titel
Kurs 16263 - CompTIA Linux+ 2004: Security
-
Inhalt
Course Overview
This series covers basic installation, operation, and troubleshooting operating systems on workstations and servers. The learner will be able to explain fundamental open source resources/licenses, demonstrate knowledge of user administration, understand file permissions/software configurations and manage local storage devices and network protocols.
Deployment Options
Self-Study
Total Learning Time
4 hours
Objectives
Unit 1: User Security 2 hours
- Identify features of algorithms used for encrypting passwords.
- Identify password controls that enforce strong passwords.
- Identify fields used for configuring password aging settings.
- Identify characteristics of the Pluggable Authentication Modules (PAM) facility.
- Identify features of the Pluggable Authentication Module (PAM) modules.
- Identify features of the pam_limits module in the Pluggable Authentication Module (PAM) facility.
- Identify key aspects of removing user accounts.
- Identify methods for disabling logins.
- Identify considerations for providing appropriate access to system resources.
- Identify features of the sudo command.
Unit 2: System Security Settings 1 hour
- Identify key security vulnerabilities in a Linux system.
- Identify methods for securing network services.
- Identify features of secure shell (SSH).
- Identify access modes for manipulating file permissions.
- Identify utilities for monitoring the integrity of files on a system.
Unit 3: Surveillance and Defense 1 hour
- Identify ways in which an Intrusion Detection System (IDS) works.
- Identify ways to configure Snort.
- Identify key aspects of PortSentry.
- Identify key aspects of Linux Intrusion Detection System (LIDS).
- Identify key aspects of IP filtering.
- Identify options for configuring SuSEfirewall2.
- Identify key aspects of log and accounting files.
Course Access
Each student has access to the course for a period of 6 months from the day of enrollment in the course.