Unix and Linux TrainingRSS

Unix/Linux Security Training

 

This page contains courses designed to teach individuals about securing Linux and Unix. Content is obviously dictated by course duration, but a good course will instruct the student about the various threats to the *nix platform and the countermeasures that can be brought to bear to defend against them. In most cases the student would be expected to have a reasonable understanding of *nix and be able to navigate around it.

Visit the Product Site

After a detailed discussion of the TCP/IP suite component protocols and Ethernet operation, practice using various tools to capture, analyze, and generate Internet Protocol (IP) traffic. Then explore the tools and techniques used to exploit protocol we ...

VendorIBM Corporation
Pricing ModelCommercial
Modified

Visit the Product Site

For Linux- and/or UNIX- systems administrators who want to build skills at configuring common network services and security administration using Red Hat Linux

VendorRed Hat, Inc
Pricing ModelCommercial
Modified

Visit the Product Site

Red Hat Enterprise Linux has gained considerable momentum as the operating system of choice for deploying network services such as web, ftp, email, and file sharing. RHS333 Red Hat Enterprise Security: Network Services is an intensive course that provides ...

VendorRed Hat, Inc
Pricing ModelCommercial
Modified

Visit the Product Site

This intermediate course is intended for administrators and support personnel who wish to learn the key skills required to implement security on Linux installations. As more servers on the network move to the Linux operating system, security becomes an in ...

VendorMicrodev
Pricing ModelCommercial
Modified

Visit the Product Site

Linux and other operating systems face a number of threats in a networked environment. It is possible to secure Linux against these threats. The Leading Edge Linux Security course provides an understanding of the security threats as well as the techniques ...

VendorLeading Edge Business Solutions (Pty) Ltd
ModifiedNever

Visit the Product Site

The UNIX family of operating systems, including the increasingly used Linux versions, is prized by IT professionals for its flexibility and openness. Vulnerabilities in standard configurations, however, can make UNIX systems susceptible to security threat ...

VendorLearning Tree International
ModifiedNever

Visit the Product Site

Experience in-depth coverage of Linux and Unix security issues. Examine how to mitigate or eliminate general problems that apply to all Unix-like operating systems, including vulnerabilities in the password authentication system, file system, virtual memo ...

VendorSans
Pricing ModelCommercial
Modified

Visit the Product Site

The Configuring Security on the Solaris 10 Operating System course provides students with the knowledge and skills to customize security on Solaris 10 systems.

VendorOracle
Pricing ModelCommercial
Modified

Visit the Product Site

Course Description: This highly technical course focuses on properly securing machines running the Linux operating systems. A broad range of general security techniques such as packet filtering, password policies, and file integrity checking are covered. ...

VendorGuru Labs, L.C
Pricing ModelCommercial
Modified

Visit the Product Site

This course focuses on network security and makes an excellent companion to: Enterprise Linux Security Administration (QLG55) After a detailed discussion of the TCP/IP suite component protocols and Ethernet operation, practice using various tools to ca ...

VendorIBM Corporation
ModifiedNever

Visit the Product Site

This training is appropriate for system security officers, system administrators, applications integrators, and other users of the Argus security systems. The course assumes familiarity with either UNIX or Linux. Learn how to operate your system in the Ar ...

VendorArgus Systems Group, Inc
Pricing ModelCommercial
Modified

Visit the Product Site

This training is appropriate for system security officers, system administrators, applications integrators, and other users of the Argus security systems. The course assumes familiarity with UNIX. * Learn how to operate your system in the Argus secure en ...

VendorArgus Systems Group, Inc
Pricing ModelCommercial
Modified

Visit the Product Site

A hands-on course focusing on security of UNIX systems. Hands on sessions will be with Red Hat Linux but the course covers all flavours of UNIX and highlights differences.

VendorSystems & Network Training Ltd
ModifiedNever

Visit the Product Site

Course Description: This extremely popular class focuses on network security, and makes an excellent companion class to the GL550: Enterprise Linux Security Administration course. After a detailed discussion of the TCP/IP suite component protocols and eth ...

VendorGuru Labs LC
Pricing ModelCommercial
Modified

Visit the Product Site

Course Description RHS429 introduces advanced system administrators, security administrators, and applications programmers to SELinux policy writing. Participants in this course will learn how SELinux works; how to manage SELinux; and how to write an S ...

VendorRed Hat, Inc
Pricing ModelCommercial
ModifiedNever

Visit the Product Site

This fast-paced, hands-on class will teach you how to secure UNIX and lock down Linux to protect a system from compromise. You'll learn how the attacks work and how to use hard-core hardening to defeat the bulk of them. You'll learn how to take your machi ...

VendorSecurity University
Pricing ModelCommercial
ModifiedNever