This course introduces students to the security features and tools available in Linux as well as the considerations, advantages, and disadvantages of using those features. The class will be based on Red Hat Linux and is designed for IT and security managers, and system administrators who want to increase their knowledge on configuring and hardening Linux from a security perspective.
Describe the basic architecture of a Linux system (e.g. kernel, file system formats, permissions, etc.)
Characterize a Linux system (identify distribution, installed packages, active accounts, etc.)
List and explain how to use common command line utilities on a Linux system for analysis purposes
Operate a Linux system, including patching, modifying services, and other administration tasks
Use a Linux system to perform analysis work such as malware and incident response analysis
The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.