Hardening is a critical step in ensuring security and diligence as it reduces the chances of attack, but this requires the use of appropriate methodologies. In today’s connected world, securing an operating system has become increasingly sophisticated as computing ecosystems increase in complexity. This course provides learners with an understand of best practices for hardening Linux and Unix systems.
Learning Objectives
On successful completion of this course, learners will understand best practices for hardening Linux and Unix systems and should have the knowledge and skills required to:
- Upgrade your kernel
- Disable root cron jobs
- Enforce strict firewall rules
- Disable unnecessary services
- Check for backdoors and rootkits
- Check listening ports
- Monitor and manage logs
- Use intrusion detection system (IDS)
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):
Specialty Areas
- Network Services
Feedback
If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.