UNIX Security and Hacking: A Complete Course
(UNXHACK, Live Instructor-Led Training, 5 days)


This SETC Certified course focuses on the many aspects of UNIX based security and hacking principles. Beginning with a complete discussion of UNIX security, the course proceeds quickly to the anatomy of an attack on UNIX based systems. Every part of the UNIX OS is included in the discussion including databases, web servers and many other UNIX system components. If you need to protect a UNIX-based system, this is the course for you.

Dates and Pricing

Jan 15 to Jan 19, 2018$2,500/person Feb 12 to Feb 16, 2018$2,500/person Mar 12 to Mar 16, 2018$2,500/person


UNIX/LINUX Security and Malware
The Anatomy of an Attack
PDRP: Plan, Detect, Respond, Prevent
Threat Sources
Threat Categories
Dealing with Viruses
Dealing with Worms
Dealing with Spyware
Dealing with Email Attacks
Dealing with Malevolent Scripts
What about the web server and other Remote Access Technologies?
What about Application Servers?
Overview of UNX/LINUX Security Measures and Tools
The Hacker’s View of UNIX/LINUX
About Authentication and Authorization
Security Architecture
Essential Security Principles
A Look at Security Realms
UNIX/LINUX Authentication
UNIX/LINUX Authorization
About Auditing and Logging
Features and Tools
Secure Default Installation
About the Super User
About Usernames and Passwords
About Firewalls
Security Templates and Security Configuration
Baseline Profiling
Using Groups and Realms
About Encryption
Protecting Files and Directories
Footprinting, Scanning and Enumeration
The Basics of Detection: The Complete Lifecycle
Exploring Footprinting
Exploring Scanning
About Computer Names and IP Addresses
Exploring RPC
Exploring SMB
Delving into DNS
A Closer look at SNMP Enumeration
Service Hacking
Cracking Passwords
Delving into UNIX/LINUX Authentication
Cracking Authentication
Other Services
Privilege Escalation and Control
Named Pipes Prediction
NetDDE Requests
Exploring Countermeasures
Command Line Control
GUI Control
Expanding the Attack
Password Cracks
About Trojan Horses
File Searching
Packet Capturing
Island Hopping
Creating Rogue User Accounts
Trojan Logon Screens
Remote Control
Where are Back Doors and Trojan Horses?
About Rootkits
Covering your Tracks
Covering Tracks
General Countermeasures
Hacking Apache
Apache Architecture
Buffer Overflow
File System Traversal
Source Code Attacks
Hacking Web Applications
Hacking Internet Clients
Browser Architecture Overview
How to Attach an Internet Client
Attacks Unleashed
The Complete Attack
Exploring Countermeasures
Hacking Databases
Defending Oracle
Security Best Practices
Hackng Telnet
About Telnet
Identifying and Enumerating Telnet
Attacking Telnet
General Telnet Countermeasures
Other Attack Strategies
Attacking the SAM
About File System Attacks
Implementing DoS Attacks