Course Overview
Learning Objectives
Upon successful completion of the course, the student will be able to:
- Identify threats to the Linux operating system and other open source applications.
- Describe components of Linux security
- Lock down the Linux boot process
- Explain user account management and the principle of least privilege to protect and secure the system and its data
- Examine the flexibility of various options with file permissions and filesystem settings and how granular control isolates data access
- Describe vulnerabilities in Linux services and the appropriate steps to mitigate the risks
- Assess how firewall, Transmission Control Protocol (TCP) Wrappers, and SELinux complement one another to secure network applications
- Describe Linux file-sharing and remote access solutions
- Describe how to secure Web services, applications, and access
- Assess the architecture of the Linux kernel and techniques used to enact a more secure kernel
- Evaluate the importance of maintaining a software management plan
- Establish a system baseline to detect anomalies
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):