Linux Security

Share on facebook
Share on google
Share on twitter
Share on linkedin

Main Topics

  • Safe installation
  • Boot services configuration
  • Configuring the kernel securely
  • File system access control
  • User access control
  • Keeping system records
  • Security monitoring tools
  • Security tightening tools
  • Scripting for security purposes
  • Who Can Participate

Who Can Participate
Security professionals who want to secure Linux-based systems, system administrators who research how to secure Linux-based Internet applications in general use, and system administrators curious about security testing and tightening tools

System administration level experience in Linux systems

Accumulation to be Obtained at the End of Education
At the end of the training, the participants will be able to easily tighten the security of Linux-based operating systems. They will be able to use many security tools available for free on their systems. In addition, they will gain the ability to use or develop tools that will enable them to notice security breaches in their systems in a short time.

Duration: 3 days