This is a hands-on course that focuses on current strategies crackers use to attack Linux systems and how system administrators may counteract such attacks.
- Introduce the Linux operating system in a desktop and server environment.
- Discuss and use the gui, the different shells and the command line interface of the Linux operating system.
- Introduce many of the Linux distributions and the different install methodologies.
- Study the directory hierarchical structure, including creation and movement inside it. Understand the differences between file permissions and user permission and how to change them.
- Introduce the Linux boot process.
- Discuss proactive security measures such as file and user permissions, log files, quota systems, firewalls, and system file integrity checkers.
- Introduce how the Linux operating system presents itself from a network topology view point. Use and understand port and network scanning and how to defend our systems against network attacks.
- Recognize the different attacks that occur from inside the network, social engineering, trojans, viruses, worms, and other cracker trickery.
- Identify and defend against physical attacks to learn to harden system against boot loader attacks, password cracking, etc.
- Discuss kernel compiling and customization including methods to harden the kernel against root kits.
- Introduce security rules we must implement and live by on a daily bases. Understand the common mistakes made to avoid making them.
- Create an action plan on a "how to" procedure that you can implement if your Linux system is currently under attack.
YOUR OPPORTUNITY: You will learn how Linux servers manage accounts and services. You will also learn how to configure Linux servers to provide maximum protection to your most prized data assets.
Take the Next Step
Learn more about Lewis University's online programs. Call (866) 967-7046 to speak with a Graduate Admissions Counselor or click here to request more information.