Skip to main content

Unix and Linux Training

Unix/Linux Security Training

 

This page contains courses designed to teach individuals about securing Linux and Unix. Content is obviously dictated by course duration, but a good course will instruct the student about the various threats to the *nix platform and the countermeasures that can be brought to bear to defend against them. In most cases the student would be expected to have a reasonable understanding of *nix and be able to navigate around it.

IBM Corporation

After a detailed discussion of the TCP/IP suite component protocols and Ethernet operation, practice using various tools to capture, analyze, and generate Internet Protocol (IP) traffic. Then explore the tools and techniques used to exploit protocol we ...

Red Hat, Inc

For Linux- and/or UNIX- systems administrators who want to build skills at configuring common network services and security administration using Red Hat Linux

Red Hat, Inc

Red Hat Enterprise Linux has gained considerable momentum as the operating system of choice for deploying network services such as web, ftp, email, and file sharing. RHS333 Red Hat Enterprise Security: Network Services is an intensive course that provides ...

This intermediate course is intended for administrators and support personnel who wish to learn the key skills required to implement security on Linux installations. As more servers on the network move to the Linux operating system, security becomes an in ...

Leading Edge Business Solutions (Pty) Ltd

Linux and other operating systems face a number of threats in a networked environment. It is possible to secure Linux against these threats. The Leading Edge Linux Security course provides an understanding of the security threats as well as the techniques ...

Learning Tree International

The UNIX family of operating systems, including the increasingly used Linux versions, is prized by IT professionals for its flexibility and openness. Vulnerabilities in standard configurations, however, can make UNIX systems susceptible to security threat ...

Experience in-depth coverage of Linux and Unix security issues. Examine how to mitigate or eliminate general problems that apply to all Unix-like operating systems, including vulnerabilities in the password authentication system, file system, virtual memo ...

The Configuring Security on the Solaris 10 Operating System course provides students with the knowledge and skills to customize security on Solaris 10 systems.

Guru Labs, L.C

Course Description: This highly technical course focuses on properly securing machines running the Linux operating systems. A broad range of general security techniques such as packet filtering, password policies, and file integrity checking are covered. ...

IBM Corporation

This course focuses on network security and makes an excellent companion to: Enterprise Linux Security Administration (QLG55) After a detailed discussion of the TCP/IP suite component protocols and Ethernet operation, practice using various tools to ca ...

Argus Systems Group, Inc

This training is appropriate for system security officers, system administrators, applications integrators, and other users of the Argus security systems. The course assumes familiarity with either UNIX or Linux. Learn how to operate your system in the Ar ...

Argus Systems Group, Inc

This training is appropriate for system security officers, system administrators, applications integrators, and other users of the Argus security systems. The course assumes familiarity with UNIX. * Learn how to operate your system in the Argus secure en ...

Systems & Network Training Ltd

A hands-on course focusing on security of UNIX systems. Hands on sessions will be with Red Hat Linux but the course covers all flavours of UNIX and highlights differences.

Guru Labs LC

Course Description: This extremely popular class focuses on network security, and makes an excellent companion class to the GL550: Enterprise Linux Security Administration course. After a detailed discussion of the TCP/IP suite component protocols and eth ...

Red Hat, Inc

Course Description RHS429 introduces advanced system administrators, security administrators, and applications programmers to SELinux policy writing. Participants in this course will learn how SELinux works; how to manage SELinux; and how to write an S ...

Security University

This fast-paced, hands-on class will teach you how to secure UNIX and lock down Linux to protect a system from compromise. You'll learn how the attacks work and how to use hard-core hardening to defeat the bulk of them. You'll learn how to take your machi ...