Main Topics
- Safe installation
- Boot services configuration
- Configuring the kernel securely
- File system access control
- User access control
- Keeping system records
- Security monitoring tools
- Security tightening tools
- Scripting for security purposes
- Who Can Participate
Who Can Participate
Security professionals who want to secure Linux-based systems, system administrators who research how to secure Linux-based Internet applications in general use, and system administrators curious about security testing and tightening tools
Prerequisites
System administration level experience in Linux systems
Accumulation to be Obtained at the End of Education
At the end of the training, the participants will be able to easily tighten the security of Linux-based operating systems. They will be able to use many security tools available for free on their systems. In addition, they will gain the ability to use or develop tools that will enable them to notice security breaches in their systems in a short time.
Duration: 3 days