linux logo

Goals


- Know how to secure a server under Linux

Program

Security at the operating system level
Security at the application
level Security at the network level

Reminders on standard Unix permissions
Extensions on ext3 / 4 filesystems
Set permissions on programs (capabilities)
New technologies: SELinux and AppArmor

Authentication and the execution environment with PAM
SSL / TLS technologies
Espionage and decryption of data exchanged
The TCP-Wrapper application firewall

Theory: how does it work?
The possibilities offered
Setting up in the Linux Kernel
Checking rules with IpTable

Practical setup with netfilter / iptables
Review of the security options of the Apache web server
Review of the security options of the postfix mail server
Review of the security options of the bind nameserver
Transparency http

Setting up internal / external access
Proxy server web cache squid / squid guard
Installation, load balancing
Squidguard url filtering

The different types of tunnels
Remote access on a linux machine: ssh
VPN via GRE protocol: pptpd
VPN with IPSec

Positioning of intrusion detection
Snort review
Log management

The tools available in Open Source
Presentation of NESSUS
Architecture components
Results formats

Backup management
Response to intrusions

Duration

3 days

Price

£ 1416

Audience

Senior system administrators

Prerequisites

System and network administration

Reference

LIN40-F

Sessions

Contact us for more informations about session date