Securing Linux Systems
Securing Linux Systems
Securing Linux Systems
1|Page
Course Objective
Duration 90 Hours
Course content has been designed for Security Professionals already proficient in Unix/Linux environment. Content delivery method would make extensive use Redhat and Kali Linux. For practicing Lab sessions participants would be provided with the software to practice in their in their laptop or desktop as each session would entail elaborate lab configuration.
Boot Security
Securing BIOS & Grub Explore & tighten the security of the INIT configuration Shell Security Securing Teletype Terminals (TTYs) and Pseudo Terminals (PTS) Restrict privileged login Use lsof to identify open files and sockets Syslog Security Analyzing syslog and Configure Syslog replication to preserve log-integrity Identify log discrepancies between Syslog hosts
Key Configuration files INIT Environment Examine INIT.D and RC hierarchies Propose methods of ensuring integrity of environment Kernel Modules Environment Explore various modules related configuration files PROC File System PROC hierarchy and PID tree and related descriptors SBIN Executables Expose SETGID and SETUID SBIN entries System Control Configuration Identify user space process Identify common variables influencing system and potential areas of concern with configuration User Accounts Environment Tighten security policy related to user accounts NSSWITCH Configuraton Identify various implementations Make changes to name resolver configuration DNS Client Resolution Configuration Identify key files governing client resolution Perform queries with incorrect resolution Correct resolution accordingly User Profiles Environment Identify system-wide and user-wide configurations and relevant profile files for $SHELL and GUI Posit suggestions to tighten baseline System Scheduler Environment Methods of tightening configuration
Course Content
SELinux Security
Access Control Model (ACM) theories (DAC/MAC/nDAC) Advantages & caveats of Mandatory Access Control (MAC)models Explore DAC-based programs Subject & object labeling Identify key utilities & files, which dictate SELinux operating mode Explore the boot process as it relates to SELinux Discuss subject & object labeling Discuss the role of extended attributes (XATTRs) Alter the lables of specific objects Configure SELinux to automatically label objects per security policy Explain security tuples Use fixfiles to restore object labels on running system per security policy Use chcon to alter object security labels Use restorecon to restore object security context (labels) Explain the Targeted Policy's features Discuss policy transitions for domains Compare & contrast confined & unconfined states Explain the security contexts applied to subjects & objects Peruse key targeted binary policy files Identify the daemons The unconfined_t domain - subject label Install the targeted policy source files Identify & discuss TE and FC files Explore file_contexts context definition for objects Using run_init to initiate SELinux-protected daemons Use 'star' to archive XATTRs Using the AVC and SELinux logs - /var/log/messages Use SETools, for real-time statistics Using SEAudit graphical SELinux log-management tool Configure new application bindings
Course Content
Participants would receive a certificate from MostlyLinux Certificate would outline entire course content
Course Content