This course introduces students to the security features and tools available in Linux as well as the considerations, advantages, and disadvantages of using those features. The class will be based on Red Hat Linux and is designed for IT and security managers, and system administrators who want to increase their knowledge on configuring and hardening Linux from a security perspective.
Learning Objectives
- Describe the basic architecture of a Linux system (e.g. kernel, file system formats, permissions, etc.)
- Characterize a Linux system (identify distribution, installed packages, active accounts, etc.)
- List and explain how to use common command line utilities on a Linux system for analysis purposes
- Operate a Linux system, including patching, modifying services, and other administration tasks
- Use a Linux system to perform analysis work such as malware and incident response analysis
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):
Specialty Areas
- Digital Forensics
- Incident Response
- Systems Analysis
Feedback
If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.