![Page 1: LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand](https://reader034.vdocuments.mx/reader034/viewer/2022050714/56649de35503460f94ada5c4/html5/thumbnails/1.jpg)
LINUX Security, Firewalls & Proxies
![Page 2: LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand](https://reader034.vdocuments.mx/reader034/viewer/2022050714/56649de35503460f94ada5c4/html5/thumbnails/2.jpg)
Course Title
• Introduction to LINUX Security Models
Objectives
• To understand the concept of system security
• To understand the need for secured systems
• Introduction to Intrusion Detection, Firewalls & Proxies
Introductory Course
![Page 3: LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand](https://reader034.vdocuments.mx/reader034/viewer/2022050714/56649de35503460f94ada5c4/html5/thumbnails/3.jpg)
Introductory Course…
Training Road Map
• Understanding the security triangle – confidentiality, integrity & availability
• Introduction to Linux Security Model • Traditional Security Architecture• Authentication & access control mechanisms• Secure Operating Systems• Partitioning and File System Security• Security Updates• Log Concept• Services and Protocols • Secure remote administration
![Page 4: LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand](https://reader034.vdocuments.mx/reader034/viewer/2022050714/56649de35503460f94ada5c4/html5/thumbnails/4.jpg)
Introductory Course…
Training Road Map…
• Firewall
• Introduction
• TCP/IP Recap
• iptables (Netfilter)
• Implementation
• Management
• Proxies
• Simulated Attack
![Page 5: LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand](https://reader034.vdocuments.mx/reader034/viewer/2022050714/56649de35503460f94ada5c4/html5/thumbnails/5.jpg)
• Duration
• 8 hours (6 hours lecture + 2 hours laboratory)
• Pre-requisites
• Basic LINUX commands
• Trainer requirement
• Good understanding of the LINUX System
• Advanced LINUX commands
• System Administration
• Understanding on Networking concepts, IP addresses, subnets, etc
• Excellent understanding of security models & their implementation
Introductory Course…
![Page 6: LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand](https://reader034.vdocuments.mx/reader034/viewer/2022050714/56649de35503460f94ada5c4/html5/thumbnails/6.jpg)
• System requirements• Hardware
• Cluster (independent of the main network) with atleast two server nodes
• Terminal for each participant• Software
• OS• Tools for ethical hacking• Firewall• Proxy• IDS / IPS
Introductory Course…
![Page 7: LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand](https://reader034.vdocuments.mx/reader034/viewer/2022050714/56649de35503460f94ada5c4/html5/thumbnails/7.jpg)
• Course material
Introductory Course…
![Page 8: LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand](https://reader034.vdocuments.mx/reader034/viewer/2022050714/56649de35503460f94ada5c4/html5/thumbnails/8.jpg)
Course Title
• LINUX Security - Intermediate
Objectives
• To understand the concept of system security
• To understand the need for secured systems
• To be able to implement Intrusion Detection, Firewalls & Proxies
Linux security – Intermediate
![Page 9: LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand](https://reader034.vdocuments.mx/reader034/viewer/2022050714/56649de35503460f94ada5c4/html5/thumbnails/9.jpg)
Training Road Map
• Understanding the security triangle – confidentiality, integrity & availability
• Introduction to Linux Security Model
• Traditional Security Architecture
• Authentication & access control mechanisms
• Partitioning and File System Security
• Security Updates
• Log Concept
• Services and Protocols
• Secure remote administration
Linux security – Intermediate
![Page 10: LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand](https://reader034.vdocuments.mx/reader034/viewer/2022050714/56649de35503460f94ada5c4/html5/thumbnails/10.jpg)
Training Road Map…
• Cryptography Basics
• SSL and VPN
• Securing Remote Access into the server
• Securing Apache
• Application-Level Gateway Basics
• IDS and IPS
Linux security – Intermediate
![Page 11: LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand](https://reader034.vdocuments.mx/reader034/viewer/2022050714/56649de35503460f94ada5c4/html5/thumbnails/11.jpg)
Training Road Map…
• Firewall
• Introduction
• Need for firewall
• TCP/IP concept recap
• TCP/IP model
• Common protocols - TCP, UDP, IP, ICMP
• TCP 3 way handshake
Linux security – Intermediate
![Page 12: LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand](https://reader034.vdocuments.mx/reader034/viewer/2022050714/56649de35503460f94ada5c4/html5/thumbnails/12.jpg)
Training Road Map…
• Firewall…
• Types of firewalls
• Working principles (at what level / layer does it do the checking)
• Software / hardware based firewall
• Packet filtering
• iptables basic configurations and usage, chains
• Practical implementations
• firewall management (using firewall script / ruleset software)
• GUI based / web based
Linux security – Intermediate
![Page 13: LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand](https://reader034.vdocuments.mx/reader034/viewer/2022050714/56649de35503460f94ada5c4/html5/thumbnails/13.jpg)
Training Road Map…
• Firewall…
• Further reading/discussion
• Firewall, why is it not enough
• Other threats that cannot be detected
• Firewall, as one of the options, not a means to solve security problems
• sample of combination with firewall usage
• IDS ? IPS ? what next? Proxies
Linux security – Intermediate
![Page 14: LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand](https://reader034.vdocuments.mx/reader034/viewer/2022050714/56649de35503460f94ada5c4/html5/thumbnails/14.jpg)
• Proxies
• Introduction
• Configuring
• Audit and Log
Linux security – Intermediate
![Page 15: LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand](https://reader034.vdocuments.mx/reader034/viewer/2022050714/56649de35503460f94ada5c4/html5/thumbnails/15.jpg)
• Duration
• 24 hours (18 hours lecture + 6 hours laboratory)
• Pre-requisites
• Basic LINUX commands
• Trainer requirement
• Good understanding of the LINUX System
• Advanced LINUX commands
• System Administration
• Understanding on Networking concepts, IP addresses, subnets, etc
• Excellent understanding of security models & their implementation
Linux security – Intermediate
![Page 16: LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand](https://reader034.vdocuments.mx/reader034/viewer/2022050714/56649de35503460f94ada5c4/html5/thumbnails/16.jpg)
• System requirements• Hardware
• Cluster (independent of the main network) with atleast two server nodes
• Terminal for each participant• Software
• OS• Tools for ethical hacking• Firewall• Proxy• IDS / IPS
Linux security – Intermediate
![Page 17: LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand](https://reader034.vdocuments.mx/reader034/viewer/2022050714/56649de35503460f94ada5c4/html5/thumbnails/17.jpg)
• Course material
Linux security – Intermediate
![Page 18: LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand](https://reader034.vdocuments.mx/reader034/viewer/2022050714/56649de35503460f94ada5c4/html5/thumbnails/18.jpg)
Course Title
• LINUX Security - Advanced
Objectives
• To understand the concept of system security
• To understand the need for secured systems
• To be able to implement Intrusion Detection, Firewalls & Proxies
• To understand possible vulnerabilities of unstable proxies and solutions
Linux security – Advanced
![Page 19: LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand](https://reader034.vdocuments.mx/reader034/viewer/2022050714/56649de35503460f94ada5c4/html5/thumbnails/19.jpg)
Training Road Map
• Understanding the security triangle – confidentiality, integrity & availability
• Introduction to Linux Security Model
• Traditional Security Architecture
• Authentication & access control mechanisms
• Secure Operating Systems
• Partitioning and File System Security
Linux security – Advanced
![Page 20: LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand](https://reader034.vdocuments.mx/reader034/viewer/2022050714/56649de35503460f94ada5c4/html5/thumbnails/20.jpg)
Training Road Map…
• Security Updates
• Log Concept
• Services and Protocols
• Secure remote administration
• Vulnerabilities, threats & exploits
Linux security – Advanced
![Page 21: LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand](https://reader034.vdocuments.mx/reader034/viewer/2022050714/56649de35503460f94ada5c4/html5/thumbnails/21.jpg)
Training Road Map…
• Cryptography Basics
• SSL and VPN
• Securing Remote Access into the server
• Securing Apache
• Application-Level Gateway Basics
• IDS and IPS
• Security awareness, Security policies, Security implementation & Change Management
Linux security – Advanced
![Page 22: LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand](https://reader034.vdocuments.mx/reader034/viewer/2022050714/56649de35503460f94ada5c4/html5/thumbnails/22.jpg)
Training Road Map…
• Firewall
• Introduction
• Need for a firewall
• TCP/IP concept recap
• TCP/IP model
• Common protocols - TCP, UDP, IP, ICMP
• TCP 3 way handshake
Linux security – Advanced
![Page 23: LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand](https://reader034.vdocuments.mx/reader034/viewer/2022050714/56649de35503460f94ada5c4/html5/thumbnails/23.jpg)
Training Road Map…
• Firewall…
• Types of firewalls
• Working principles (at what level / layer does it do the checking)
• Software / hardware based firewall
• Packet filtering
• iptables basic configurations and usage, chains
• Practical implementations
• firewall management (using firewall script / ruleset software)
• GUI based / web based
Linux security – Advanced
![Page 24: LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand](https://reader034.vdocuments.mx/reader034/viewer/2022050714/56649de35503460f94ada5c4/html5/thumbnails/24.jpg)
Training Road Map…
• Firewall…
• Further reading/discussion
• Firewall, why is it not enough
• other threats that cannot be detected
• as one of the options, not a means to solve all security problems
• sample of combination with firewall usage
• IDS ? IPS ? what next? Proxies
Linux security – Advanced
![Page 25: LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand](https://reader034.vdocuments.mx/reader034/viewer/2022050714/56649de35503460f94ada5c4/html5/thumbnails/25.jpg)
• Proxies
• Intoduction
• Configuring
• Vulnerabilities of unstable proxies & solutions
• Audit and Log
• Database level security
• Introduction to Ethical Hacking
• Analysing your server security (e.g.: detecting/preventing Trojans, backdoors, bruteforce attack)
• DDoS attack
Linux security – Advanced
![Page 26: LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand](https://reader034.vdocuments.mx/reader034/viewer/2022050714/56649de35503460f94ada5c4/html5/thumbnails/26.jpg)
• Duration• 10 days (each day with 6 hours lecture + 2 hours
laboratory)
• Pre-requisites• Basic LINUX commands
• Trainer requirement• Good understanding of the LINUX System• Advanced LINUX commands• System Administration• Understanding on Networking concepts, IP
addresses, subnets, etc• Excellent understanding of security models & their
implementation
Linux security – Advanced
![Page 27: LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand](https://reader034.vdocuments.mx/reader034/viewer/2022050714/56649de35503460f94ada5c4/html5/thumbnails/27.jpg)
• System requirements• Hardware
• Cluster (independent of the main network) with atleast two server nodes
• Terminal for each participant• Software
• OS• Tools for ethical hacking• Firewall• Proxy• IDS / IPS
Linux security – Advanced
![Page 28: LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand](https://reader034.vdocuments.mx/reader034/viewer/2022050714/56649de35503460f94ada5c4/html5/thumbnails/28.jpg)
• Course material
Linux security – Advanced
![Page 29: LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand](https://reader034.vdocuments.mx/reader034/viewer/2022050714/56649de35503460f94ada5c4/html5/thumbnails/29.jpg)
Thank You