Red Hat Linux Enterprise Server 5.x Security Administration

Duration: 
2 days
Versions: 
5.X

Overview

This course provides delegates with the knowledge and skills necesary to secure RHEL5 at the system and network levels. This highly-practical course covers Red Hat Enterprise Linux (RHEL5), but much of the material is also relevant to earlier versions.

After completing this course, students will be able to:

  • Explain Security concerns and policy.
  • Configure authentication Services.
  • Secure the system.
  • Secure Networks.
  • Secure Services.
  • Secure Data.

Please Note: This course is designed to impart technical information to the delegates. It is not designed to teach audit techniques, standards or remedial plans.

Audience

This course is intended for Linux/Unix system and network administrators who want to learn about securing Red Hat Linux.

Prerequisites

Delegates should already have some real-world experience with Red Hat Linux system and network administration. Attendance of our Red Hat Linux System Administration and Linux System Advanced Administration courses would be beneficial.

This course is available on site only. Please call for details.

Course Outline

  • Security Concerns and Policies
  • Security Terms.
  • Basic Network Security.
  • Which services are running?
  • Remote Service Detection.
  • Definitions of Security.
  • Security Policy.
  • Backup Policies.
  • Authentication Services
  • Authentication Basics.
  • Service Profile: PAM.
  • PAM Operation.
  • Core PAM Modules.
  • Authentication Modules.
  • Password Security.
  • Resource Limits.
  • User Access Control.
  • Single User Mode.
  • Authentication Troubleshooting.
  • System Monitoring
  • System Monitoring Overview.
  • File System Analysis.
  • Set User and Group ID Permissions.
  • Typical Problamatic Permissions.
  • ext2 filesystem attributes.
  • Monitoring Data Integrity with Tripwire.
  • Configuring Tripwire.
  • System Log Files.
  • syslogd and klogd configuration.
  • Advanced syslogd configuration.
  • Log File Analysis.
  • Monitoring and Limiting Processes.
  • Monitoring processes with top.
  • Monitoring processes Graphically.
  • System Activity Reporting.
  • Process Accounting Tools.
  • Securing Networks
  • Packet Filtering Capabilities.
  • NetFilter Architecture.
  • Chain operations.
  • Rule Targets.
  • Rule Matching.
  • Network Address Translation (NAT).
  • Connection Tracking.
  • Rule Persistence.
  • The Bastion Host.
  • Managing Services
  • System V Startup Control.
  • Starting the Service.
  • tcp_wrappers configuration.
  • Daemon specification.
  • Client specification.
  • Advanced syntax.
  • xinetd-based security.
  • xinetd Access Control.
  • Host Patterns.
  • Advanced Security Options.
  • Securing Data
  • The need for encryption.
  • Cryptography building blocks.
  • Random Numbers.
  • One-Way Hashes.
  • Symmetric Encryption.
  • Asymmetric Encryption.
  • Public Key Infrastructures.
  • Digital Certificates.
  • Generating Digital Certificates.
  • OpenSSH Overview.
  • The OpenSSH.
  • OpenSSH Authentication.
  • Protecting your keys.
  • Application: rpm.

Thinking about Onsite?

If you need training for 3 or more people, you should ask us about onsite training. Putting aside the obvious location benefit, content can be customised to better meet your business objectives and more can be covered than in a public classroom. It's a cost effective option.

Submit an enquiry from any page on this site, and let us know you are interested in the requirements box, or simply mention it when we contact you.

Upcoming Dates

  • GREEN This class is Guaranteed To Run.
  • SPVC - Self-Paced Virtual Class.
  • Click a Date to Enroll.
Course Location Days Cost Date
Onsite
Onsite2 1000 £1000 2018-12-13