UNIX Audit and Security
Starting dates and places
Description
Prerequisites:
Attendees should be IT literate with a good understanding of similar topics in another operating environment. Ths course assumes no prior knowledge of UNIX.Course Description:
To provide staff new to UNIX with an extensive insight into all issues connected with security in a UNIX environment. Whilst this course covers many aspects of the UNIX operating environment itself, network security is considered to be a separate issue. Delegates will be able to satisfactorily cope with the day-to-day security administration of a multi-user UNIX site, understand security issues and be able to implement security policies in an enterprise level multi-server environment.
This course includes t…
Frequently asked questions
There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.
Prerequisites:
Attendees should be IT literate with a good understanding of similar topics in another operating environment. Ths course assumes no prior knowledge of UNIX.Course Description:
To provide staff new to UNIX with an extensive insight into all issues connected with security in a UNIX environment. Whilst this course covers many aspects of the UNIX operating environment itself, network security is considered to be a separate issue. Delegates will be able to satisfactorily cope with the day-to-day security administration of a multi-user UNIX site, understand security issues and be able to implement security policies in an enterprise level multi-server environment.
This course includes the following modules:
Course Content
- Introduction
- Unix Basics and Getting Help
- Understanding the UNIX Filesystem
- Useful Commands for Security Administrators
- Security and the different ?¢‚Äöá®?¨flavours of UNIX
- Controlling Access to the System (User and group management, types of access)
- Controlling Access to the root account and other privileged services
- Controlling Access to Files and the Filesystem
- Dangerous Commands (and why they are sometimes needed)
- Security Implications of Backing Up and Securing the System
- Monitoring Security Issues on the System
- Best Practice Procedures
For online live training advice please visit our Learning Advice Centre on our website. Be sure to follow us on Twitter to receive special course offers, news and updates!
Share your review
Do you have experience with this course? Submit your review and help other people make the right choice. As a thank you for your effort we will donate £1.- to Stichting Edukans.There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.