Uploaded by Oscar Robles

Linux Fundamentals for Security Practitioners Syllabus

advertisement
Course Syllabus
Linux Fundamentals for Security Practitioners
Instructor Name: Corey T. Holzer
Instructor Website: linkedin.com/in/coreyholzer/
Instructor Contact: cholzer@cybrary.it
Course Creation Date: May 2022
Course Description and Goals
Course Description:
Target Audience: This course is designed for IT Security Professionals who want to master the
Linux Operating System and the tools it provides for securing the network environment.
Course Level: Intermediate
Prerequisites:
❏ Rudimentary knowledge of networks
Supplementary Materials: Linux Commands Quick Reference Guide
Course Goals: By the end of this course, you should be able to:
❏
❏
❏
❏
Explain the origins and structure of Linux
Know the command-line interface and many useful commands
Gain familiarity with many of the common tools in Linux
Gain practical skills as you “get your hands dirty” using commands to handle basic
security problems you will encounter in the wild
Brought to you by:
Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
1
Course Outline
Module 1 | Course Overview and Instructor Introduction
Lesson 1.1: Course Overview and Instructor Introduction
Module 2 | What is Linux?
Lesson 2.1: Linux History
Lesson 2.2: Linux Architecture
Lesson 2.3: Linux OS Structure
Module 3 | Diving Into Linux
Lesson 3.1: Demystifying the Command Line or How I Learned to Love the CLI
Lesson 3.2: Useful Commands and How to Employ Them, Part I
Lesson 3.3: Useful Commands and How to Employ Them, Part II
Lesson 3.4: Using Pipes and Redirections on the Command Line
Lesson 3.5: Locating Files and Finding Rogue Executables
Lesson 3.6: Looking Inside Files and Finding Obfuscated Content
Lesson 3.7: Encrypting Data at Rest on a File Server
Lesson 3.8: Encrypting Using gpgtar and What’s Hidden in a File
Lesson 3.9: Finding Suspicious Logins and Retrieving Rogue Login Details
Lesson 3.10: Replacing Passwords
Lesson 3.11: Employing Public Key Infrastructure (PKI) with SSH & 2-Factor
Authentication
Lesson 3.12: The Importance of Securing Services
Lesson 3.13: Employing Secure HTTPS
Lesson 3.14: The Role of Network Scanning
Lesson 3.15: Finding Rogue Processes and Services
Lesson 3.16: Intrusion Detection and Prevention Systems
Lesson 3.17: Log Scanning
Lesson 3.18: Log Evaluation and Analysis
Module 4 | Course Review and What’s Next
Lesson 4.1: What’s Next
Lesson 4.2: Course Review
Brought to you by:
Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
2
Download