SETC Training844-434-7382
 Find a Course: 
 
Programming TrainingMicrosoft TrainingMS Office TrainingServer TrainingManagement TrainingNetwork TrainingAbout UsContact Us

LINUX Training


Explained what could be have been very complicated information in a clear and concise manner which allowed myself to follow along and understand with ease. Instructor had great enthusiasm that kept us all involved.
Comment from Shared Services Canada

1. Title

  • UNIX Security and Hacking: A Complete Course (UNXHACK, 5 days)
    View PDF

2. Course Pre-requisites

  • Extensive UNIX OS experience

3. Target Audience

  • UNIX professionals who want to secure and lock-down a UNIX based environment

4. Dates and Pricing


Aug 14 to Aug 18, 2017$2,775.00/person
Oct 30 to Nov 3, 2017$2,775.00/person

5. Outline

Module 1: UNIX/LINUX Security and Malware

Topic 1: The Anatomy of an Attack

Topic 2: PDRP: Plan, Detect, Respond, Prevent

Topic 3: Threat Sources

Topic 4: Threat Categories

Topic 5: Dealing with Viruses

Topic 6: Dealing with Worms

Topic 7: Dealing with Spyware

Topic 8: Dealing with Email Attacks

Topic 9: Dealing with Malevolent Scripts

Topic 10: What about the web server and other Remote Access Technologies?

Topic 11: What about Application Servers?

Topic 12: Overview of UNX/LINUX Security Measures and Tools

Module 2: The Hacker’s View of UNIX/LINUX

Topic 1: About Authentication and Authorization

Topic 2: Security Architecture

Topic 3: Essential Security Principles

Topic 4: A Look at Security Realms

Topic 5: UNIX/LINUX Authentication

Topic 6: UNIX/LINUX Authorization

Topic 7: About Auditing and Logging

Module 3: Features and Tools

Topic 1: Secure Default Installation

Topic 2: About the Super User

Topic 3: About Usernames and Passwords

Topic 4: About Firewalls

Topic 5: Security Templates and Security Configuration

Topic 6: Baseline Profiling

Topic 7: Using Groups and Realms

Topic 8: About Encryption

Topic 9: Protecting Files and Directories

Module 4: Footprinting, Scanning and Enumeration

Topic 1: The Basics of Detection: The Complete Lifecycle

Topic 2: Exploring Footprinting

Topic 3: Exploring Scanning

Topic 4: About Computer Names and IP Addresses

Topic 5: Exploring RPC

Topic 6: Exploring SMB

Topic 7: Delving into DNS

Topic 8: A Closer look at SNMP Enumeration

Module 5: Service Hacking

Topic 1: Cracking Passwords

Topic 2: Delving into UNIX/LINUX Authentication

Topic 3: Cracking Authentication

Topic 4: Other Services

Module 6: Privilege Escalation and Control

Topic 1: Named Pipes Prediction

Topic 2: NetDDE Requests

Topic 3: Exploring Countermeasures

Topic 4: Command Line Control

Topic 5: GUI Control

Module 7: Expanding the Attack

Topic 1: Auditing

Topic 2: Password Cracks

Topic 3: About Trojan Horses

Topic 4: File Searching

Topic 5: Packet Capturing

Topic 6: Island Hopping

Module 8: Cleanup

Topic 1: Creating Rogue User Accounts

Topic 2: Trojan Logon Screens

Topic 3: Remote Control

Topic 4: Where are Back Doors and Trojan Horses?

Topic 5: About Rootkits

Topic 6: Covering your Tracks

Topic 7: Covering Tracks

Topic 8: General Countermeasures

Module 9: Hacking Apache

Topic 1: Apache Architecture

Topic 2: Buffer Overflow

Topic 3: File System Traversal

Topic 4: Source Code Attacks

Topic 5: Hacking Web Applications

Module 10: Hacking Internet Clients

Topic 1: Browser Architecture Overview

Topic 2: How to Attach an Internet Client

Topic 3: Attacks Unleashed

Topic 4: The Complete Attack

Topic 5: Exploring Countermeasures

Module 11: Hacking Databases

Topic 3: Defending Oracle

Topic 4: Security Best Practices

Module 12: Hackng Telnet

Topic 1: About Telnet

Topic 2: Identifying and Enumerating Telnet

Topic 3: Attacking Telnet

Topic 4: General Telnet Countermeasures

Module 13: Other Attack Strategies

Topic 1: Attacking the SAM

Topic 2: About File System Attacks

Topic 3: Implementing DoS Attacks

SETC Training on LinkedIn follow @CTESTraining Follow us on Facebook
  Programming Training
  Microsoft Training
  Network Training
  Management Training
  Server Training
  Microsoft Office Training
Site developed and authored by Jean-Marc Choquette