Må vi gemme en cookie?

Vi bruger cookies for at forbedre din oplevelse af vores hjemmeside, målrette indhold samt statistik. Læs mere om cookies

Kurser

Kursusadministration

Brug for hjælp?

  • Gregersensvej 8
  • 2630 Taastrup
Google MapsApple MapsRejseplanen
  • Forskerparken Fyn, Forskerparken 10F
  • 5230 Odense M
Google MapsApple MapsRejseplanen
  • Teknologiparken Kongsvang Allé 29
  • 8000 Aarhus C
Google MapsApple MapsRejseplanen
  • NordsøcentretPostboks 104
  • 9850Hirtshals
Google MapsApple MapsRejseplanen
  • Gammel Ålbovej 1
  • 6092Sønder Stenderup
Google MapsApple MapsRejseplanen

Masterclass: Hacking and Securing Linux Infrastructure

Kurset er for dig som arbejder på Linux Operating System og som ved, hvor vigtig cybersikkerhed er. Du lærer hvordan du beskytter Jeres infrastruktur mod forskellige trusler. Er du nysgerrig efter, hvilke værktøjer penetration testerer bruger, er dette kurset for dig. Undervisningen foregår på engelsk.

Deltagerprofil

System Administrators, Network Administrators, IT Architects, Security Professionals.

Indhold

Module 1: Ensure secure boot process
  • Possible attacks during boot process
  • Protect BIOS / UEFI
  • Protect GRUB2 boot loader
  • Offline attacks on your systems
  • Encrypting partitions with LUKS
  • VeraCrypt for multi OS support
Module 2: Securing Data
  • How hackers can compromise your environment by stealing your backups
  • Say hello to PGP: encryption and signing
  • Differences between symmetric and asymmetric encryption
  • Encrypting backups with GnuPG
  • Problems with email security
Module 3: Hardening SSH
  • SSH Protocol version
  • Choosing the right ciphers
  • Prevent Root Login
  • Securing SFTP
  • Attacking SSH
  • How SSH server can be used in attacks
Module 4: Attacking and protecting services
  • Attacking and protecting DNS
  • DNSSEC configuration
  • Attacking and protecting mail servers
  • Additional protection for web servers
  • Attack and defend databases
Module 5: Securing User Accounts
  • Password policy
  • User group management
  • Advanced sudo tricks:
  • • Sudo timer
  • • Shell escapes attacks
  • • Preventing users from running certain programs
  • Restricting system resources
  • Brute force attacks and prevention
Module 6: Permissions
  • File permissions and ownership
  • Configure partitions to prevent SUID and SGID binaries
  • Using extended file attributes to protect sensitive files
  • Local Privilege Escalation by:
  • • SUID and SGID binaries
  • • Wrong permissions
  • • Improperly secured partitions
Module 7: OS-level virtualization
  • Chroot
  • Docker
  • Hardening containers
Module 8: Firewalls
  • Advanced network scanning and services enumeration with nmap
  • Extend nmap with custom scripts
  • Protect your network with firewalls
  • Intrusion detection and log analysis with PSAD
  • Honeypots
Module 9: SELinux and AppArmor
  • SELinux overview
  • Setting security contexts for files and folders
  • Troubleshooting with setroubleshoot
  • Stopping attacks with SELinux
  • AppArmor overview
  • AppArmor profiles
  • AppArmor utilities
  • Stopping attacks with AppArmor
Module 10: Antivirus scanning
  • Antivirus defenses with ClamAV
  • Fight against malware with Maldet
  • Rootkit hunter
Module 11: Vulnerability Scanning
  • Check your SSL setup
  • Searching vulnerabilities on web servers
  • Vulnerability scanners
Module 12: Auditing
  • Configure audit daemon
  • Create audit rules
  • Using ausearch and aureport
  • Detect internal and external attacks with auditing
Module 13: Security baselines
  • Scan and remediate your system with OpenSCAP
  • Using SCAP Workbench
  • Check your system with Lynis
  • CIS Top 10 Security Controls
Module 14: Central configuration management
  • Using Ansible
  • Configure access for ansible on servers
  • Ansible playbooks and roles
  • Other tools
Module 15: Intrusion Detection
  • Network intrusion detection
  • Host based intrusion detection
  • Signature vs anomaly-based detection

Materiale

Presentation slides, workshop instructions.

CPE Point (Continuing professional education)

It will be possible to earn CPE points after completion this course.

Underviser

Krystian Zieja NY
Krystian Zieja is a professional Infrastructure and Database Consultant with over 15 years of extensive experience in designing IT solutions. His practice spans from teaching Oracle Courses in OAI at University, to providing services for big public and consulting companies serving clients from four continents. Being a holder of numerous IT certificates such as OCP, MCSE, MCDBA and CISP.

og

Underviser Adrian Denkiewicz
Adrian Denkiewicz is Expert with over 8 years of experience as Penetration Tester, Cybersecurity Specialist, and Software Developer. He has worked for financial, ecommerce, and semiconductor industry. Adrian performed dozens of penetration tests and security reviews cooperating with teams from all over.

Har du faglige spørgsmål, så kontakt:
Andre kigger også på