This course introduces students to the security features and tools available in Linux as well as the considerations, advantages, and disadvantages of using those features. The class will be based on Red Hat Linux and is designed for IT and security managers, and system administrators who want to increase their knowledge on configuring and hardening Linux from a security perspective.
- Describe the basic architecture of a Linux system (e.g. kernel, file system formats, permissions, etc.)
- Characterize a Linux system (identify distribution, installed packages, active accounts, etc.)
- List and explain how to use common command line utilities on a Linux system for analysis purposes
- Operate a Linux system, including patching, modifying services, and other administration tasks
- Use a Linux system to perform analysis work such as malware and incident response analysis
If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.