Linux Security (LFS416) Training in Tustin

Enroll in or hire us to teach our Linux Security (LFS416) class in Tustin, California by calling us @303.377.6176. Like all HSG classes, Linux Security (LFS416) may be offered either onsite or via instructor led virtual training. Consider looking at our public training schedule to see if it is scheduled: Public Training Classes
Provided there are enough attendees, Linux Security (LFS416) may be taught at one of our local training facilities.
We offer private customized training for groups of 3 or more attendees.

Course Description

 
This advanced, completely hands-on course adopts a highly technical approach to cover important security techniques and tools. By providing visibility both into attack vectors and possible security holes, this course provides you a complete guide on how to mitigate security risks in any Linux environment. You will get direct experience with: Assessing security risks in your enterprise Linux environment. The best techniques and tools to increase security. Server hardening Deploying monitoring and attack detection tools. Gaining visibility into possible vulnerabilities. Developing your Linux security policy and response strategy. Configuring your systems for compliance with HIPAA, DISA STIG, etc. And more.
Course Length: 4 Days
Course Tuition: $2800 (US)

Prerequisites

Attendees should: Have a solid understanding of core local system administration and networking concepts and be experienced with Linux (or more generally UNIX), especially at the command line level.

Course Outline

 
Introduction
Linux Foundation
Linux Foundation Training
Logistics
 
Introduction to Security
What is Security
 
Threats and Risk Assessment
Types of Attacks
Trade Offs
 
Physical Access
Physical Security
Hardware Security
Understanding the Linux Boot Process
 
Logging
Logging Overview
Syslog Services
The Linux Kernel Audit Daemon
Linux Firewall Logging
Log Reports
 
Auditing and Detection
Auditing Basics
Understanding an Attack Progression
Detecting an Attack
Intrusion Detection Systems
 
Application Security
Bugs, Beetles, and More
Tracking and Documenting Changes
Resource Access Control
Mitigation Techniques
Policy Based Access Control Frameworks
Real World Example
 
Kernel Vulnerabilities
Kernel and User Spaces
Bugs
Mitigating Kernel Vulnerabilities
Vulnerabilities Examples
 
Authentication
Encryption and Authentication
Passwords
Hardware Tokens
Biometric Authentication
Network and Centralized Authentication
 
Local System Security
Standard UNIX Permissions
Administrator Account
Advanced UNIX Permissions
Filesystem Integrity
Filesystem Quotas
 
Network Security
TCP/IP Protocols Review
Remote Trust Vectors
Remote Exploits
 
Network Services Security
Network Tools
Databases
Web Server
File Servers
 
Denial of Service
Network Basics
DoS Methods
Mitigation Techniques
 
Remote Access
Unencrypted Protocols
Accessing Windows Systems
SSH
IPSEC VPNs
 
Firewalling and Packet Filtering
Firewalling Basics
Netfilter (IPTables)
Netfilter Implementation
Mitigate Brute Force Login Attempts
 
Response and Mitigation
Preparation
During an Incident
Handling Incident Aftermath
Conclusion

Course Directory [training on all levels]

Upcoming Classes
Gain insight and ideas from students with different perspectives and experiences.

Linux Unix Uses & Stats

Linux Unix is Used For:
Desktop Mainframe Computers Mobile Devices Embedded Devices
Difficulty
Popularity
Year Created
1991/1971
Pros
Performance:
Linux supports many efficient tools and operates them seamlessly. Because it's architecture is lightweight it runs faster than both Windows 8.1 and 10. 
 
Security:
Because Linux is an open-source software,  anyone can contribute code to help enhance the users’ experience i.e., adding features, fixing bugs, reducing security risks, and more.
 
 
Software Development:
The terminal in Linux is a *wild card*. You can do almost anything with it. This includes software installation, application and server configurations, file system management, and etc.
 
Large-scale:
Open-source projects benefit from having an attentive community. As a result, Linux is more secure than Windows. Instead of installing anti viruses to clean malware, you just have to stick to the recommended repositories. 
 
Efficient: 
Developers have the convenience of running servers, training machine learning models, accessing remote machines, and compiling and running scripts from the same terminal window. 
 
Free: 
Linux is free (you can put it on as many systems as you like) and you can change it to suit your needs.
Cons
Learning Curve: 
Linux is not for everyone, there is a learning curve in switching to Ubuntu. To actually learn Linux efficiently would take a user one to several years.
 
No Tech Support:
Unlike Windows, there isn’t a dedicated tech support, so getting help for things is up to you. 
 
Designer Compatabilty:
Linux is not as user friendly as Windows or as ‘straight out of the box design’ As an example for design choices, Adobe hasn’t released any of its products to Linux users. So it’s impossible to run them directly. The Ubuntu alternative is a free software called GIMP. 
 
Gaming Capabilities: 
Most games aren’t available in Linux. But that’s not to say you can’t make it happen, it's just not as easy.   
Linux Unix Job Market
Average Salary
$85k-$105k
Job Count
n/a
Top Job Locations

New York City
Boston
San Francisco 

Complimentary Skills to have along with Linux Unix
The following are types of jobs that may require Linux skills.  The top 15 job titles on Dice.com that mention Linux in their postings are:
- DevOps Engineer
- Software Engineer
- Java Developer
- Systems Engineer
- Systems Administrator
- Senior Software Engineer
- Network Engineer
- Python Developer
- Linux Systems Administrator
- Software Developer
- System Administrator
- Linux Administrator
- Linux Engineer
- Senior Java Developer
- C++ Developer

Interesting Reads Take a class with us and receive a book of your choosing for 50% off MSRP.