• Online, Self-Paced
Course Description

This course introduces students to the security features and tools available in Linux as well as the considerations, advantages, and disadvantages of using those features. The class will be based on Red Hat Linux and is designed for IT and security managers, and system administrators who want to increase their knowledge on configuring and hardening Linux from a security perspective.

Learning Objectives

  • Describe the basic architecture of a Linux system (e.g. kernel, file system formats, permissions, etc.)
  • Characterize a Linux system (identify distribution, installed packages, active accounts, etc.)
  • List and explain how to use common command line utilities on a Linux system for analysis purposes
  • Operate a Linux system, including patching, modifying services, and other administration tasks
  • Use a Linux system to perform analysis work such as malware and incident response analysis

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Digital Forensics
  • Incident Response
  • Systems Analysis

Specialty Areas have been removed from the NICE Framework. With the recent release of the new NICE Framework data, updates to courses are underway. Until this course can be updated, this historical information is provided to give better context as to how it can help you with your cybersecurity goals.