Course Syllabus Linux Fundamentals for Security Practitioners Instructor Name: Corey T. Holzer Instructor Website: linkedin.com/in/coreyholzer/ Instructor Contact: cholzer@cybrary.it Course Creation Date: May 2022 Course Description and Goals Course Description: Target Audience: This course is designed for IT Security Professionals who want to master the Linux Operating System and the tools it provides for securing the network environment. Course Level: Intermediate Prerequisites: ❏ Rudimentary knowledge of networks Supplementary Materials: Linux Commands Quick Reference Guide Course Goals: By the end of this course, you should be able to: ❏ ❏ ❏ ❏ Explain the origins and structure of Linux Know the command-line interface and many useful commands Gain familiarity with many of the common tools in Linux Gain practical skills as you “get your hands dirty” using commands to handle basic security problems you will encounter in the wild Brought to you by: Develop your team with the fastest growing catalog in the cybersecurity industry. Enterprise-grade workforce development management, advanced training features and detailed skill gap and competency analytics. 1 Course Outline Module 1 | Course Overview and Instructor Introduction Lesson 1.1: Course Overview and Instructor Introduction Module 2 | What is Linux? Lesson 2.1: Linux History Lesson 2.2: Linux Architecture Lesson 2.3: Linux OS Structure Module 3 | Diving Into Linux Lesson 3.1: Demystifying the Command Line or How I Learned to Love the CLI Lesson 3.2: Useful Commands and How to Employ Them, Part I Lesson 3.3: Useful Commands and How to Employ Them, Part II Lesson 3.4: Using Pipes and Redirections on the Command Line Lesson 3.5: Locating Files and Finding Rogue Executables Lesson 3.6: Looking Inside Files and Finding Obfuscated Content Lesson 3.7: Encrypting Data at Rest on a File Server Lesson 3.8: Encrypting Using gpgtar and What’s Hidden in a File Lesson 3.9: Finding Suspicious Logins and Retrieving Rogue Login Details Lesson 3.10: Replacing Passwords Lesson 3.11: Employing Public Key Infrastructure (PKI) with SSH & 2-Factor Authentication Lesson 3.12: The Importance of Securing Services Lesson 3.13: Employing Secure HTTPS Lesson 3.14: The Role of Network Scanning Lesson 3.15: Finding Rogue Processes and Services Lesson 3.16: Intrusion Detection and Prevention Systems Lesson 3.17: Log Scanning Lesson 3.18: Log Evaluation and Analysis Module 4 | Course Review and What’s Next Lesson 4.1: What’s Next Lesson 4.2: Course Review Brought to you by: Develop your team with the fastest growing catalog in the cybersecurity industry. Enterprise-grade workforce development management, advanced training features and detailed skill gap and competency analytics. 2