[vc_row][vc_column][fancy_heading h1=”0″ style=”line” title=”Linux: Security Expertise”][/fancy_heading][/vc_column][/vc_row][vc_row][vc_column][vc_tta_tour style=”modern” shape=”round” color=”sky” spacing=”30″ controls_size=”md” active_section=”1″][vc_tta_section title=”Goals ” tab_id=”1604066852386-47838d6b-c0bc”][vc_column_text]

  • Master the techniques and tools of security, protection and intrusion analysis in order to deploy an optimal security strategy.

[/vc_column_text][/vc_tta_section][vc_tta_section title=”Public ” tab_id=”1604066852414-7fe207c4-2c1d”][vc_column_text]System administrators, network administrators, security analysts.[/vc_column_text][/vc_tta_section][vc_tta_section title=”Prerequisites ” tab_id=”1604066854142-e35c13d7-54ad”][vc_column_text]Good knowledge of Linux system administration.[/vc_column_text][/vc_tta_section][vc_tta_section title=”Duration ” tab_id=”1604066855053-5058317e-791f”][vc_column_text]3 Days.[/vc_column_text][/vc_tta_section][vc_tta_section title=”Pedagogical Methods ” tab_id=”1604066855911-5be94578-f592″][vc_column_text]This Linux training is punctuated by an alternation of presentations and practical work. For “Distance” training, they are carried out with a Teams or Zoom type videoconferencing tool depending on the case, allowing the trainer to adapt his pedagogy. our website for all the details on remote sessions or virtual classes.[/vc_column_text][/vc_tta_section][vc_tta_section title=”Programs ” tab_id=”1604066856779-8dcdeba5-0582″][vc_column_text]Basic concepts

Cryptology concepts: algorithms, protocols, private / public keys Various viruses and types of attacks: Trojans, Worms, Spoofing… Understanding IPV4 and IPV6 network exchanges

Local security techniques

Secure authentication applications with PAM Secure access to the administration console with GRUB Type Enforcement security with SELinux Basic audit commands: help, tripwire… Packet filtering techniques (iptables) and firewalls ( shorewall)

Network security techniques

The SSH protocol and commands (ssh, scp, ssh-keygen, ssh-agent, etc.) Presentation of the global SSO-type solution: Kerberos Implementation of a PKI-type security system with OpenCASecuring Internet services (Web, DNS …) and messaging Implementation of VPN (IPSec, OpenVPN)

Ethical intrusion techniques

How to master the techniques of “Hackers” to better defend yourself Techniques and tools to try to crack passwords Analysis of TCP / IP packets (tcpdump, wireshark, dsniff, ettercap) Port scanning (nmap) and intrusion simulation (nessus) Presentation of the network intrusion detection solution: snort[/vc_column_text][/vc_tta_section][vc_tta_section title=”Register for training” tab_id=”1604066858354-29480abe-4368″][vc_column_text]