Linux Security – Introduction


Return to schedule


Course Title Linux Security – Introduction (System Security)
Course Number 900-050-EQ
Platform Linux
Duration 30 hours
Emploi-Québec fee (taxes incl.)
General Public fee (taxes incl.)
Schedule TBA
Dates Winter 2020
Prerequisites Basic knowledge of Linux operating system
Target Audience IT professionals
Instructor Rahul Ranjan
Location TBA

NB: This is a non-credit course.  Certificate provided for all participants who have completed 80% of course hours.
Recommended textbook:  No textbook is required for this course.

Course Description:

Please note that the focus of this course is on system security.

This course will teach you everything you need to know about Linux security. It begins with a review of Linux command line and operating system components.  This is a practical, hands on course that will elevate your understanding of Linux security to an entirely new level.

The first focus is on standard Unix security mechanisms such as users, groups, file and directory permissions.

Further topics include: ACL (Access Control Lists – similar to MS Windows security permissions) and SELinux (Security Enhanced Linux), IPTables firewall setup for workstations, servers and routers using UFW and FWBuilder. As well as: the 3 types of cryptographic algorithms and their practical use, using SSL/TLS to secure Apache, FTP and other network servers, less known powerful security features of SSH, Intrusion Detection Kits, and common mistakes made by Linux administrators that often result in compromised security.

Topics to be covered include:

System security

  • Review of Linux command line and OS components
  • Keeping your system up to date – tools and best practices
  • Standard UNIX security mechanisms for files and directories
  • Using groups to control access to data and programs
  • Sudo use and fine-grained control of access
  • Access Control Lists (ACL) in Linux – practical use
  • 3 types of cryptographic algorithms and their application
  • The 8 advanced features of Secure Shell (SSH)
  • Backdoors, rootkits, shell exploits – how they work, detection, prevention, removal
  • Tools for logs monitoring (intrusion detection)
  • SELinux (Security Enhanced Linux) – basic concepts and application
  • 30-seconds firewall setup using UFW tool