Ethical Hacking ITRONIX CERTIFIED

Advance Linux Research it’s Security

 

Overview :

Learn how to eliminate or mitigate security issues on Unix based operating systems, file systems or applications that run on Unix and Linux. You’ll get practical guidance and configuration support with real world examples, techniques and tricks to manage security. The Securing Linux training program outlines a highly technical approach using a number of tools and techniques in an enterprise environment with Linux setup. Utilize tools such as AIDE, lsof, sudo, SSH for handling security issues.
One of the main concerns in business environments nowadays is to secure systems from unscrupulous intentions that may damage the integrity and privacy of critical business information. The Securing Linux course from Itronix Solution will help professionals safeguard their Linux/Unix systems from threats and vulnerabilities. Securing Linux and Unix systems course offers a complete guide on mitigating security risks by providing visibility of possible security loopholes and attack vectors. So join this course if you want your Linux/Unix system to be in your control.

Prerequisites

  1. Before attending this course, students should have one year of experience managing Unix/Linux systems or have equivalent knowledge and skills
  2. Good Understanding of TCP/IP is required

Course Content :

Linux and its Secret (Module -1)

  1. Hacking Methodology
  2. Ultimate goal of Hacking
  3. General Linux Security
  4. Vulnerability Scanner
  5. Scan Detector
  6. Hardening Linux Box.

Network Attack (Module-2)

  1. Information Gathering Technique
  2. Scan technique
  3. Enumeration
  4. Sniffing
  5. Spoofing
  6. Dos
  7. Social Engineering
  8. Trojan and Rootkit

Log and Integrity (Module-3)

  1. Log management
  2. Event Correlation
  3. Log Analysis Tools
  4. Integrity and its benefits
  5. Integrity Tools: Tripwire

Secure File and Directory (Module-4)

  1. Gnupg protection on Files
  2. Prohibit Directory listing
  3. Securing Shared Directory
  4. Encrypting file and directory
  5. Digital signature on text file

Secure File and Directory (Module-4)

  1. Gnupg protection on Files
  2. Prohibit Directory listing
  3. Securing Shared Directory
  4. Encrypting file and directory
  5. Digital signature on text file

Control on Authorization (Module-5)

  1. Restrict root login shell
  2. Run X program as root
  3. Control user activities via sudo
  4. Control Priviledge via ssh

Firewall with iptable(Module-6)

  1. Restrict Network Attack
  2. Control access via Mac address
  3. Testing a firewall configuration
  4. Logging simplified

IDS and Honeypot (Module-7)

  1. IDS and its benefits
  2. Open Source IDS tools: Snort
  3. Honeypot
  4. Honeypot tools: Honeyd
  5. Web server scanner tools: NIkto
  6. Monitoring ARP table
  7. Implement Antivirus

Testing and Monitoring (Module-8)

  1. Password Cracking Technique
  2. Password Cracking tools
  3. Monitoring File system
  4. Checking for suspicious account

Leave a Reply

Your email address will not be published. Required fields are marked *