Speak to our team now +44 (0)1737 821590

Securing UNIX systems

A 3 day
training course

UNIX security training course description

A hands-on course focusing on security of UNIX systems. Hands on sessions will be with Red Hat Linux but the course covers all flavours of UNIX and highlights differences.

Key outcomes from this course

By the end of the course delegates will be able to:
  • Read shell scripts.
  • Write shell scripts.
  • Use different types of quotes.
  • Recognise the role of shell scripts within the UNIX

UNIX security training course details

Who will benefit:
Support personnel.
Technical security staff.
UNIX fundamentals
Intro to UNIX system administration.
3 days

Training approach

This structured training course seeks to build upon workbook learning through the use of group exercises, dynamic discussion and individual tasks in order to deliver an engaging and interactive module that will ensure all candidates are able to transfer their new skills into the workplace.

Overall ratings for this course:

Course review

"Hard concepts were explained very simply."
J. S., Framestore CFC
"Excellent presentation - very good course structure."
B. M., London Internet Exchange

UNIX security training course contents

Security basics
Authentication, privacy, availability, integrity, physical security, personnel security, CERT, vendor mailing lists, obtaining patches, installing patches.

Monitoring the system
Log files, syslogd, system accounting, other useful tools, obtaining open source tools, how programs are run (cron, at, startup files).

Account security
The login process, password policies, enforcing strong passwords, PAMs, checking passwords with password crackers, disabling accounts, timing out idle users, restricted shells, Role based Access Mechanisms, sudo vs su, /etc/sudoers, logs, special accounts, the root user, controlling root access, authentication, one time passwords, OPIE.

File system security
Network security

Major service security
Securing DNS, HTTP, sendmail, NFS, Samba and X.

Difference between UNIX flavours, using UNIX as an IDS, port scanners, references, a checklist.

Why Choose Us

SNT trainers score an average of over 90% on the three main areas of:
  • Ability to teach
  • Technical knowledge
  • Answering questions
“Excellently presented by a very knowledgeable and enthusiastic trainer.” P.D. General Dynamics

We limit our maximum class size to 8 delegates; often we have less than this. This ensures optimal interactivity between delegates and instructor.
"Excellent course. The small class size was a great benefit…" M.B. IBM

We write our own courses; courseware does not just consist of slides and our slides are diagrams not bullet point text. A typical chapter provides clearly defined objectives with a chapter overview, slides with text underneath, a quiz at the end to check the learning of the students. Hands on exercises are at the end and are used to reinforce the theory.

See Dates & Prices for this course

To enquire about this course

To reserve this course online