Call us now:
  +91-961 026 8059
  +91-931 430 8880
Top Courses
Red Hat Certified Security Specialist (RHCSS)
Red Hat Certified Datacenter Specialist (RHCDS)
 

The full RHCE curriculum consists of three courses or modules:


 

RHS333 red hat enterprise security-network services
Course Description

Red Hat Enterprise Linux has gained considerable momentum as the operating system of choice for deploying network services, such as web, FTP, email, and file sharing. RHS333 is an intensive course that provides four days of instruction and labs on how to to use the latest technologies to secure your services. This class advances beyond the essential security coverage offered in the RHCE curriculum and delves more deeply into the security features, capabilities, and risks associated with the most commonly deployed services.

 

Audience

  • Experienced Linux system administrators responsible for the overall security of their systems and networked services 
  • Experienced UNIX or Linux system administrators tasked with security on other operating systems but who now want to perform those tasks on a Red Hat Linux system  

 

Prerequisites

  • RH253, RHCE certification, or equivalent work experience .
  • Attendees should already know the essential elements of how to configure the services covered, as this course will be focusing on more advanced topics from the outset .

Course Content

  • Mastering basic service security  
  • Understanding cryptography  
  • Logging system activity and synchronizing system time  
  • Security BIND and DNS  
  • Securing centrally-managed user authentication   Improving NFS security  
  • Advanced uses of the secure shell (SSH)  
  • Securing e-mail with Sendmail and Postfix  
  • Managing FTP and Apache security  
  • Basics of intrusion response

Course Content

RHS333 goes beyond the essential security coverage offered in the RHCE curriculum and delves deeper into the security features, capabilities, and risks associated with the most commonly deployed services. Among the topics covered in this four-day, hands-on course are the following

1. The Threat Model and Protection Methods

  • Internet threat model and the attacker's plan
  • System security and service availability
  • An overview of protection mechanisms

2. Basic Service Security

  •  SELinux
  •  Host-based access control
  •  Firewalls using Netfilter and iptables
  •  TCP wrappers
  •  xinetd and service limits

3. Cryptography

  •  Overview of cryptographic techniques
  •  Management of SSL certificates
  •  Using GnuPG

 

4. Logging and NTP

  • Time synchronization with NTP
  • Logging: syslog and its weaknesses
  •  Protecting log servers

5. BIND and DNS Security

  • BIND vulnerabilities
  • DNS Security: attacks on DNS
  • Access control lists
  • Transaction signatures
  • Restricting zone transfers and recursive queries
  • DNS Topologies
  • Bogus servers and blackholes
  • Views
  • Monitoring and logging
  •  Dynamic DNS security

6. Network Authentication: RPC, NIS, and Kerberos

  •  Vulnerabilities
  •  Network-managed users and account management
  •  RPC and NIS security issues
  •  Improving NIS security
  •  Using Kerberos authentication
  •  Debugging Kerberized Services
  •  Kerberos Cross-Realm Trust
  •  Kerberos Encryption

7. Network File System

  •  Overview of NFS versions 2, 3, and 4
  •  Security in NFS versions 2 and 3
  •  Improvements in security in NFS4
  •  Troubleshooting NFS4
  •  Client-side mount options

8. OpenSSH

  • Vulnerabilities
  • Server configuration and the SSH protocols
  • Authentication and access control
  • Client-side security
  • Protecting private keys
  •  Port-forwarding and X11-forwarding issues

9. Electronic Mail with Sendmail

  •  Vulnerabilities
  •  Server topologies
  •  Email encryption
  •  Access control and STARTTLS
  •  Anti-spam mechanisms

10. Postfix

  •  Vulnerabilities
  •  Security and Postfix design
  •  Configuring SASL/TLS

 

11. FTP

  •  Vulnerabilities
  •  The FTP protocol and FTP servers
  •  Logging
  •  Anonymous FTP
  •  Access control

12. Apache security

  •  Vulnerabilities
  • Access control
  •  Authentication: files, passwords, Kerberos
  •  Security implications of common configuration options
  •  CGI security
  •  Server side includes
  •  suEXEC

13. Intrusion Detection and Recovery

    •  Intrusion risks
    •  Security policy
    •  Detecting possible intrusions
    •  Monitoring network traffic and open ports
    •  Detecting modified files
    •  Investigating and verifying detected intrusions
    •  Recovering from, reporting, and documenting intrusions
 
 
All rights reserved Linux guru.com l A venture of M.S.Technosoft Pvt. Ltd.