Linux System Security

4 Day Course
Hands On
Code LSS

Book Now - 2 Delivery Methods Available:

Classroom Virtual Classroom Private Group - Virtual Self-Paced Online


The Linux System Security hands-on practical course is aimed at Linux System Administrators who wish to enhance their knowledge of Linux security and increase the security of their Linux systems.

The course is designed to teach security related tasks that would be relevant for all Linux distributions and runs on CentOS Linux.

Exercises and examples are used throughout the course to give practical hands-on experience with the techniques covered.


The delegate will gain an understanding of:

  • Linux security basics, precautions and common attack methods
  • Viewing and configuring the key Linux log files
  • Querying and configuring the Linux Audit Framework
  • Knowledge and execution of key SELinux commands
  • Modifying SELinux policy and policy modules
  • Configuring the Red Hat firewall
  • Securing Linux applications and remote logging
  • Securing SSH
  • Installing and configuring a Host Intrusion Detection System
  • Detecting root kits
  • Increasing system security with PAM
  • Basic and advanced sudo configuration
  • Securing Linux logins
  • Enchancing filesystem security and encrypting files
  • Installing and configuring a password cracking utility
  • Configuring an OpenVPN server and client
  • Red Hat security updates and verifying packages

Target Audience

The Linux System Security course is aimed at System Administrators who wish to increase their knowledge of the many Linux security features and increase the security level of their Linux systems.

Additional Information

  • Course technical content is subject to change without notice.
  • Course content is structured as sessions, this does not strictly map to course timings. Concepts, content and practicals often span sessions.

Training Partners

We work with the following best of breed training partners using our bulk buying power to bring you a wider range of dates, locations and prices.


Hide all

Linux Security Overview (5 topics)

  • Security Basics
  • Areas Of Security
  • Common Attack Methods
  • Basic Security Precautions
  • Standards and Compliance

Logging within Linux (4 topics)

  • Important Linux Log Files
  • The Linux journal
  • The Linux Audit Framework
  • Configuring Remote Logging

SELinux (6 topics)

  • DAC vs MAC
  • Mandatory Access Control Solutions
  • An Overview Of SELinux
  • Viewing SELinux Decisions
  • SELinux Commands
  • Modifying The SELinux Policy

Advanced SELinux Configuration (3 topics)

  • Creating SELinux Rules
  • Creating SELinux Policy Modules
  • Comparison Of SELinux Policies

The Red Hat Firewall (4 topics)

  • Creating Service Files
  • Creating Firewall Zones
  • Firewall Rich Rules
  • Installing and Configuring Fail2ban

Securing Applications (4 topics)

  • Creating A Certificate Authority
  • Securing Remote Logging
  • Securing VSFTPd With TLS
  • Securing NTP and Chrony

Securing SSH (7 topics)

  • An Overview Of SSH
  • Key Algorithms
  • SSH Agents
  • SSH Server Options
  • The known_hosts File
  • Certificate Based Authentication
  • SSH Tunneling

Intrusion Detection and Prevention (5 topics)

  • The Need For Intrusion Detection
  • Detecting Intrusions With AIDE
  • Rootkits
  • Viruses
  • Installing and Configuring ClamAV

Security via Pluggable Authentication Modules (5 topics)

  • An Overview Of PAM
  • Increasing Password Security/li>
  • Time-Based Authentication
  • Controlling SSH With PAM
  • Controlling Failures With PAM

Sudo and Securing Logins (6 topics)

  • Restricting Linux Accounts
  • Automatic Logout
  • Extended File Attributes
  • Securing Linux History
  • Sudo
  • Advanced Sudo Configuration

Securing the Filesystem (6 topics)

  • Filesystem Security Considerations
  • Protecting The Boot Menu
  • Filesystem Options
  • Filesystem SELinux Options
  • Filesystem Encryption
  • Special File Permissions

Cracking Linux Passwords (4 topics)

  • An Overview Of Password Hashing
  • Installing And Configuring A Cracking Utility
  • Installing a Word List
  • Resetting A Lost root Password

Virtual Private Networks (4 topics)

  • The Need For Virtual Private Networks
  • An Overview Of Virtual Private Networks
  • Configuring An OpenVPN Server
  • Configuring An OpenVPN Client

Further Security Considerations (4 topics)

  • Viewing And Verifying Software Packages
  • Red Hat Security Updates
  • Linux Command Line History
  • Vim Security Considerations


Delegates attending this course should have experience of administering Linux in an Enterprise environment to the level covered in the Linux System Administration (LPI & CompTIA) course or the Administering Red Hat Linux 7 - Part 1 course.

Additional Learning

The courses below may help you meet the knowledge level required to take this course.

  • Linux System Administration

    A 5-day Training Course on LINUX System Administration; On completion delegates will be able to administer a live LINUX system.

    5 Day Course Hands On Training Course Code LSA
    Classroom Virtual Classroom Private Group - Virtual Self-Paced Online

Scheduled Dates

Please select from the dates below to make an enquiry or booking.


Different pricing structures are available including special offers. These include early bird, late availability, multi-place, corporate volume and self-funding rates. Please arrange a discussion with a training advisor to discover your most cost effective option.

Code Location Duration Price Apr May Jun Jul Aug Sep
Later scheduled dates may be available for this course.

Course PDF


Share this Course


Recommend this Course