Unix Security Administration Training in Aurora

Enroll in or hire us to teach our Unix Security Administration class in Aurora, Colorado by calling us @303.377.6176. Like all HSG classes, Unix Security Administration may be offered either onsite or via instructor led virtual training. Consider looking at our public training schedule to see if it is scheduled: Public Training Classes
Provided there are enough attendees, Unix Security Administration may be taught at one of our local training facilities.
We offer private customized training for groups of 3 or more attendees.

Course Description

 
This five-day course enhances system administrator's abilities to develop practical security measures on their Solaris machines. Students will be provided with hands-on experience in addition to valuable security knowledge.
Course Length: 5 Days
Course Tuition: $1690 (US)

Prerequisites

Completion of Introduction to UNIX, UNIX Administration I, and UNIX Administration II or equivalent experience.

Course Outline

 

Security Concepts
What is Security?
Balance
Scope of this Manual
Staying up to Date
Documentation
Thinking Like the Enemy

Creating a Security Policy
What is a Security Policy?
Step 1 - Initially Secure the System
Step 2 - Maintain System Security
Step 3 - Recovery

Securing User Accounts
Introduction
Account Names
Mail aliases
The /etc/passwd, /etc/shadow and /etc/group files
Users and their passwords
Users with no passwords
Forcing user to change their password
Preventing user from changing their password
Restricted shell
Application accounts
Same UID, multiple user accounts
Dealing with the su command
Saving login failures
Tool: ASET
Tool: Crack
Other tools

Securing System Accounts
The root Account
Tools: COPS
Other System Accounts
Group System Account

Securing the File System
Basic UNIX permissions
Setting default permissions
Special permission: SUID
Special permission: SGID
Special permission: sticky bit
Access Control Lists (ACL)
Changing the ownership of a file
Changing the group ownership of a file
Device files
Partitions
Disk Quotas
Backups
Tool: Using pkgchk to detect security problems
Tool: Tiger

 
System Startup and Processes
Boot Up Process
Process Control

cron and at
crontab vs. at
Using the crontab Command
Using the at Command
Additional Security Concerns Regarding crontab and at
Tool: Tripwire

Auditing
ASET
System Logs
Typical System Logs
Process Accounting

Programmed Threats
What are Programmed Threats?
Protecting Against Programmed Threats
Executable Stacks

Physical Security
What is Physical Security?
Access Protection
Protecting PROM
Devices
Natural Disasters
Hardware Error
Theft

Network Security
Overview of Network Security
Basic Networking Files
Network Services
Unnecessary Services
Tool: Secure Shell
NFS
Firewalls
Tool: Satan

Course Directory [training on all levels]

Upcoming Classes
Gain insight and ideas from students with different perspectives and experiences.

Linux Unix Uses & Stats

Linux Unix is Used For:
Desktop Mainframe Computers Mobile Devices Embedded Devices
Difficulty
Popularity
Year Created
1991/1971
Pros
Performance:
Linux supports many efficient tools and operates them seamlessly. Because it's architecture is lightweight it runs faster than both Windows 8.1 and 10. 
 
Security:
Because Linux is an open-source software,  anyone can contribute code to help enhance the users’ experience i.e., adding features, fixing bugs, reducing security risks, and more.
 
 
Software Development:
The terminal in Linux is a *wild card*. You can do almost anything with it. This includes software installation, application and server configurations, file system management, and etc.
 
Large-scale:
Open-source projects benefit from having an attentive community. As a result, Linux is more secure than Windows. Instead of installing anti viruses to clean malware, you just have to stick to the recommended repositories. 
 
Efficient: 
Developers have the convenience of running servers, training machine learning models, accessing remote machines, and compiling and running scripts from the same terminal window. 
 
Free: 
Linux is free (you can put it on as many systems as you like) and you can change it to suit your needs.
Cons
Learning Curve: 
Linux is not for everyone, there is a learning curve in switching to Ubuntu. To actually learn Linux efficiently would take a user one to several years.
 
No Tech Support:
Unlike Windows, there isn’t a dedicated tech support, so getting help for things is up to you. 
 
Designer Compatabilty:
Linux is not as user friendly as Windows or as ‘straight out of the box design’ As an example for design choices, Adobe hasn’t released any of its products to Linux users. So it’s impossible to run them directly. The Ubuntu alternative is a free software called GIMP. 
 
Gaming Capabilities: 
Most games aren’t available in Linux. But that’s not to say you can’t make it happen, it's just not as easy.   
Linux Unix Job Market
Average Salary
$85k-$105k
Job Count
n/a
Top Job Locations

New York City
Boston
San Francisco 

Complimentary Skills to have along with Linux Unix
The following are types of jobs that may require Linux skills.  The top 15 job titles on Dice.com that mention Linux in their postings are:
- DevOps Engineer
- Software Engineer
- Java Developer
- Systems Engineer
- Systems Administrator
- Senior Software Engineer
- Network Engineer
- Python Developer
- Linux Systems Administrator
- Software Developer
- System Administrator
- Linux Administrator
- Linux Engineer
- Senior Java Developer
- C++ Developer

Interesting Reads Take a class with us and receive a book of your choosing for 50% off MSRP.