Enterprise Linux systems face persistent threats from misconfiguration, credential attacks, and privilege escalation. Security professionals and Linux administrators need practical, layered defenses that span the full stack, from network perimeter scanning through kernel-level auditing and mandatory access controls. This course delivers hands-on, defense-in-depth security training on your choice of RHEL or SLES, building skills that directly apply to production hardening and compliance requirements.
Coverage spans the complete security administration lifecycle: system minimization and hardening fundamentals, network scanning and vulnerability assessment with nmap and OpenVAS, password security and PAM configuration, Kerberos 5 deployment and administration across three dedicated chapters, filesystem security with mount options and NFS controls, AIDE file integrity monitoring, kernel auditd for compliance-grade accountability, SELinux mandatory access controls, and securing Apache and PostgreSQL services with authentication and TLS. Snort network intrusion detection rounds out the defensive toolkit.
With 48 guided lab exercises, students spend roughly half the course applying security concepts on live systems: writing Snort IDS rules, cracking passwords with John the Ripper, deploying a complete Kerberos realm, configuring SELinux policies, and hardening production services end to end.