SETC Training844-434-7382
 Find a Course: 
Programming TrainingMicrosoft TrainingMS Office TrainingServer TrainingManagement TrainingNetwork TrainingAbout UsContact Us

LINUX Training

Liked the interactive working with other students in the class. This allowed practice of not only the exercise, but what it would be like in a work environment.
Comment from HRSDC

1. Title

  • UNIX Security and Hacking: A Complete Course (UNXHACK, 5 days)
    View PDF

2. Course Pre-requisites

  • Extensive UNIX OS experience

3. Target Audience

  • UNIX professionals who want to secure and lock-down a UNIX based environment

4. Dates and Pricing

Apr 24 to Apr 28, 2017$2,775.00/person
Aug 14 to Aug 18, 2017$2,775.00/person
Oct 30 to Nov 3, 2017$2,775.00/person

5. Outline

Module 1: UNIX/LINUX Security and Malware

Topic 1: The Anatomy of an Attack

Topic 2: PDRP: Plan, Detect, Respond, Prevent

Topic 3: Threat Sources

Topic 4: Threat Categories

Topic 5: Dealing with Viruses

Topic 6: Dealing with Worms

Topic 7: Dealing with Spyware

Topic 8: Dealing with Email Attacks

Topic 9: Dealing with Malevolent Scripts

Topic 10: What about the web server and other Remote Access Technologies?

Topic 11: What about Application Servers?

Topic 12: Overview of UNX/LINUX Security Measures and Tools

Module 2: The Hacker’s View of UNIX/LINUX

Topic 1: About Authentication and Authorization

Topic 2: Security Architecture

Topic 3: Essential Security Principles

Topic 4: A Look at Security Realms

Topic 5: UNIX/LINUX Authentication

Topic 6: UNIX/LINUX Authorization

Topic 7: About Auditing and Logging

Module 3: Features and Tools

Topic 1: Secure Default Installation

Topic 2: About the Super User

Topic 3: About Usernames and Passwords

Topic 4: About Firewalls

Topic 5: Security Templates and Security Configuration

Topic 6: Baseline Profiling

Topic 7: Using Groups and Realms

Topic 8: About Encryption

Topic 9: Protecting Files and Directories

Module 4: Footprinting, Scanning and Enumeration

Topic 1: The Basics of Detection: The Complete Lifecycle

Topic 2: Exploring Footprinting

Topic 3: Exploring Scanning

Topic 4: About Computer Names and IP Addresses

Topic 5: Exploring RPC

Topic 6: Exploring SMB

Topic 7: Delving into DNS

Topic 8: A Closer look at SNMP Enumeration

Module 5: Service Hacking

Topic 1: Cracking Passwords

Topic 2: Delving into UNIX/LINUX Authentication

Topic 3: Cracking Authentication

Topic 4: Other Services

Module 6: Privilege Escalation and Control

Topic 1: Named Pipes Prediction

Topic 2: NetDDE Requests

Topic 3: Exploring Countermeasures

Topic 4: Command Line Control

Topic 5: GUI Control

Module 7: Expanding the Attack

Topic 1: Auditing

Topic 2: Password Cracks

Topic 3: About Trojan Horses

Topic 4: File Searching

Topic 5: Packet Capturing

Topic 6: Island Hopping

Module 8: Cleanup

Topic 1: Creating Rogue User Accounts

Topic 2: Trojan Logon Screens

Topic 3: Remote Control

Topic 4: Where are Back Doors and Trojan Horses?

Topic 5: About Rootkits

Topic 6: Covering your Tracks

Topic 7: Covering Tracks

Topic 8: General Countermeasures

Module 9: Hacking Apache

Topic 1: Apache Architecture

Topic 2: Buffer Overflow

Topic 3: File System Traversal

Topic 4: Source Code Attacks

Topic 5: Hacking Web Applications

Module 10: Hacking Internet Clients

Topic 1: Browser Architecture Overview

Topic 2: How to Attach an Internet Client

Topic 3: Attacks Unleashed

Topic 4: The Complete Attack

Topic 5: Exploring Countermeasures

Module 11: Hacking Databases

Topic 3: Defending Oracle

Topic 4: Security Best Practices

Module 12: Hackng Telnet

Topic 1: About Telnet

Topic 2: Identifying and Enumerating Telnet

Topic 3: Attacking Telnet

Topic 4: General Telnet Countermeasures

Module 13: Other Attack Strategies

Topic 1: Attacking the SAM

Topic 2: About File System Attacks

Topic 3: Implementing DoS Attacks

SETC Training on LinkedIn follow @CTESTraining Follow us on Facebook
  Programming Training
  Microsoft Training
  Network Training
  Management Training
  Server Training
  Microsoft Office Training
Site developed and authored by Jean-Marc Choquette