The UNIX family of operating systems, including the increasingly used Linux versions, is prized by IT professionals for its flexibility and openness. Vulnerabilities in standard configurations, however, can make UNIX systems susceptible to security threats. Protection against intrusion is an absolute requirement for those depending on UNIX systems. This course provides the knowledge and skills you need to establish security for your UNIX and Linux platforms. Through a series of practical hands-on exercises, you learn to use tools and utilities to assess vulnerabilities, detect configurations that threaten security and provide effective access controls.