Network Penetration Testing course for beginners taking you from wondering what hackers do to setting up a lab, learning Kali Linux, and conducting your own network penetration testing!.
Would you like to learn what hackers do to setting up a lab, learn Kali Linux and conduct your own penetration testing because this will help you level up your cyber security and ethical hacking career?
Linux Security The Linux Operating System has proven time and time that it reigns supreme in configurability and security. Being well versed in Linux Security can make the difference between a highly available web server and a compromised warez distribution point. Understanding Linux Security can make or break your ability to survive in the world of ever-changing Computer Security. The Authors Brad Causey and Bobby Rogers work together to present Linux Security so you can carry the knowledge back and use it in a practical manner. To begin learning simply click the links. Introduction & Course Outline -- Introduction Introduction To Linux Security -- A Bit About Linux Pt.1 -- A Bit About Linux Pt.2 -- Current Security Problems -- Requirements of a Secure OS -- Security: Windows vs Linux -- Overview of Linux Security Features Secure Linux Installation -- Selecting the Right Distribution -- Defining Partitions for Security -- Installing Software & Services -- Installing Secure File Systems -- Installation Security Configurations -- Post Install Actions -- Secure Installation Demonstration Pt.1 -- Secure Installation Demonstration Pt.2 -- Secure Installation Demonstration Pt.3 Securing The Linux Boot Process -- Securing LILO -- Securing GRUB -- Runlevel Security & initab -- Partition Mounting & fstab Security With Users & Groups -- Users & Groups -- Passwords Pt.1 -- Passwords Pt.2 -- Use of Privileged Accounts -- Securing User Shells & Profiles File System Permissions -- Types of Files -- Permission Structure -- Special Permission Bits -- Managing Permissions Data Encryption -- Introduction to Encryption -- Using GNU GPG Pt.1 -- Using GNU GPG Pt.2 -- Using SSH -- Hashing Utilities -- Using PKI Certificates in Linux Hardening Linux -- System Hardening Overview -- Bastille Pt.1 -- Bastille Pt.2 -- Securing X-Windows -- Securing Linux Daemons -- Security Patches -- Security Benchmarks Linux Firewalls -- Introduction to Firewalls -- IP Tables Pt.1 -- IP Tables Pt.2 -- IP Tables Demonstration Pt.1 -- IP Tables Demonstration Pt.2 -- Dedicated Linux Firewalls Linux Security Mechanisms -- TCP Wrappers -- hosts.allow -- hosts.deny -- inetd & xinetd -- PAMs -- SELinux -- Unsecure Linux Utilities Secure Networking -- OpenSSH -- SAMBA -- NIS -- NFS -- Securing FTP & HTTP Servers Detecting & Stopping Linux Attacks -- System Auditing -- System Logging -- File Integrity with Tripwire -- Intrusion Detection with Snort Linux Security Tools -- Vulnerability Assessment with Nessus Pt.1 -- Vulnerability Assessment with Nessus Pt.2 -- Traffic Security with Ethereal -- Web Proxying with Squid Best Linux Security Practices -- User Security -- Password Security -- Securing the Root Account -- File System Security -- System Security -- Auditing Pt.1 -- Auditing Pt.2 -- Network Security
No prerequisites. Basics are covered
Anyone who wants to make career in Network Security domain
About Technology Incubation Center CIU
Technology Incubation Center CIU since inception in 2002, is committed to introducing new courses and certification programs pertinent to industry standard, which currently boasts a large pool of certified professionals benefitting more than 1,20,000 successful participants. TIC CIU's certified candidates that have become the most sought after professionals serving reputed corporates and government organisations like CISCO, Microsoft, TCS, Infosys, Dell, IBM, GM, Wipro, HCL, HP ... and the list grows crossing more than 1000 companies which have trusted our trained and certified professionals to become their valued assets.