Red Hat Enterprise Security: Network Services

Level:
Costs:
Total time:
Provider rating: 10 Perpetual Solutions has an average rating of 10 (out of 1 reviews)
Logo Perpetual Solutions

Tip: Receive more information about the programme, starting dates & price. Or request a proposal from multiple providers for in-house training.

Overview

Your experience of this course?

Did you attend the course Red Hat Enterprise Security: Network Services at Perpetual Solutions? Help other people by submitting your review at Springest!

Springest will donate £1.- to the Edukans Foundation as a thank you for each review

 
Schedule:
Daytime
Run time:
4 Days
Location type:
Open

vat information, completion, maximum participants, and starting dateplaces are unknown for this course.

Prerequisites:

* RH253 Red Hat Linux Networking and Security Administration
* RH300 RHCE Rapid Track Course (and RHCE Exam)
* or RHCE certification or equivalent work experience is required for this course
* Course participants should already know the essential elements of how to configure the services covered, as this course will be focusing on more advanced topics from the outset.

Course Description:

Red Hat Enterprise Linux has gained considerable momentum as the operating system of choice for deploying network services such as web, ftp, email, and file sharing. RHS333 Red Hat Enterprise Security: Network Services is an intensive course that provides four days of instruction and labs on how to …

Read the complete description

Description

Prerequisites:

* RH253 Red Hat Linux Networking and Security Administration
* RH300 RHCE Rapid Track Course (and RHCE Exam)
* or RHCE certification or equivalent work experience is required for this course
* Course participants should already know the essential elements of how to configure the services covered, as this course will be focusing on more advanced topics from the outset.

Course Description:

Red Hat Enterprise Linux has gained considerable momentum as the operating system of choice for deploying network services such as web, ftp, email, and file sharing. RHS333 Red Hat Enterprise Security: Network Services is an intensive course that provides four days of instruction and labs on how to to use the latest technologies to secure your services.

This course includes the following modules:

The Threat Model and Protection Methods

  • Internet threat model and the attackers plan
  • System security and service availability
  • An overview of protection mechanisms

Basic Service Security

  • SELinux
  • Host-based access control
  • Firewalls using Netfilter and iptables
  • TCP wrappers
  • xinetd and service limits

Cryptography

  • Overview of cryptographic techniques
  • Management of SSL certificates
  • Using GnuPG

Logging and NTP

  • Time synchronization with NTP
  • Logging: syslog and its weaknesses
  • Protecting log servers

BIND and DNS Security

  • BIND vulnerabilities
  • DNS Security: attacks on DNS
  • Access control lists
  • Transaction signatures
  • Restricting zone transfers and recursive queries
  • DNS Topologies
  • Bogus servers and blackholes
  • Views
  • Monitoring and logging
  • Dynamic DNS security

Network Authentication: RPC, NIS, and Kerberos

  • Vulnerabilities
  • Network-managed users and account management
  • RPC and NIS security issues
  • Improving NIS security
  • Using Kerberos authentication
  • Debugging Kerberized Services
  • Kerberos Cross-Realm Trust
  • Kerberos Encryption

Network File System

  • Overview of NFS versions 2, 3, and 4
  • Security in NFS versions 2 and 3
  • Improvements in security in NFS4
  • Troubleshooting NFS4
  • Client-side mount options

OpenSSH

  • Vulnerabilities
  • Server configuration and the SSH protocols
  • Authentication and access control
  • Client-side security
  • Protecting private keys
  • Port-forwarding and X11-forwarding issues

Electronic Mail with Sendmail

  • Vulnerabilities
  • Server topologies
  • Email encryption
  • Access control and STARTTLS
  • Anti-spam mechanisms

Postfix

  • Vulnerabilities
  • Security and Postfix design
  • Configuring SASL/TLS

FTP

  • Vulnerabilities
  • The FTP protocol and FTP servers
  • Logging
  • Anonymous FTP
  • Access control

Apache Security

  • Vulnerabilities
  • Access control
  • Authentication: files, passwords, Kerberos
  • Security implications of common configuration options
  • CGI security
  • Server side includes
  • suEXEC

Intrusion Detection and Recovery

  • Intrusion risks
  • Security policy
  • Detecting possible intrusions
  • Monitoring network traffic and open ports
  • Detecting modified files
  • Investigating and verifying detected intrusions
  • Recovering from, reporting, and documenting intrusions

For online live training advice please visit our Learning Advice Centre on our website. Be sure to follow us on Twitter to receive special course offers, news and updates!

Reviews

There are no reviews yet. Submit your review and help other people make the right choice. As a thank you for your effort we will donate £1.- to Stichting Edukans.

More courses within this subject:

Compare 36,039 training courses in subjects like Red Hat Enterprise

Subscribe to our newsletter?

Receive news, tips, articles, interviews and education on personal development each month.

Sign up to create your own Learning Lists.

Not for humans