Title: Linux System Hardening Training 10
1SECURIUM FOX offers cyber security consultancy
services with its expert and experienced team. We
are providing consulting services to prevent
cyber attacks, data leak and to ensure that our
customers are ready and safe against cyber
attacks, with more than 15 years of
experience.In addition to pentests and
consulting services, SECURIUM FOX prepares its
customers and field enthusiasts for real life
scenarios by providing trainings in the lab
environment which was prepared by themselves,
with its young, dynamic and constantly following
team.Everytime that hackers are in our lives,
there are always risks that we can face with a
cyber attack. Over the years cyber security has
become a critical precaution for all
organizations and companies after the effects and
number of attacks. SECURIUM FOX tests the weak
points of customers for possible attacks and
provides consulting services to eliminate these
weak points.SECURIUM FOX team also offers
support for the development of our country in
this field by supporting free events being
organized as a volunteer by the Octosec team.
ABOUT US
2- LINUX SYSTEM HARDENING TRAINING
3- Training materials
- Training materials are renowned for being the
most comprehensive and user friendly available.
Their style, content and coverage is unique in
the embedded systems training world, and has made
them sought after resources in their own right.
The materials include - Fully indexed class notes creating a complete
reference manual - Workbook full of practical examples and solutions
to help you apply your knowledge
4- Structure and Content
- Security fundamentals
- What is security and why is it necessary?
Security concepts and terminology
Defense-in-depth approach Why are devices
attacked and who attacks them? The guiding
principles of securing a system - Linux boot, bootloaders and the chain of trust
- The bootloader Debug and trace The Linux
kernel interface Building a chain of trust
Example boot scenarios and fast boot
Hibernation and security
5- Hardening the Linux kernel
- What is the Linux kernel? Configuring the
kernel Trace and debug options Kernel modules
Kernel build options Kernel hardening Linux
security modules Understanding the Kernel
Crypto subsystem and key management Latest
kernel security features Practical Adding a
security patch to a standard kernel - Network security
- Data in motion The internet protocol suite
Link layer protection Internet and transport
layer protection Application layer protection
Network domains, firewalls and port forwarding
Wireless security Other digital connectivity
threats Practicals Port scanning, implementing
a firewall - Security testing and release control
- Testing and the Secure Software Development
Lifecycle Release management Test tools
Practical basic penetration testing
6- Security testing tools
- System breaking tools Network tools File
system tools Vulnerability testing and exploit
frameworks - Securing the software environment
- Dynamic loading Limiting resources Limiting
kernel access Practical Dynamic linking - Common kernel attacks and mitigations
- Fundamental system software vulnerabilities
Application level attacks Attacks against the
system Side-channel attacks Practical Â
Common attacks and protecting against them
7- nformation security
- Data at rest and in use Linux filesystems
Integrity and Authenticity Confidentiality
Availability Caching and security Overview on
SoC hardware security features that can help - Linux Security Module
- The origin and role of LSMs Mandatory Access
Control LSMs used in embedded systems
Performance impacts of LSMs Practical adding
LSM hardening to an LXC sandbox.
8The training term is 2 days.
- Participants in the trainings will be given a
certificate of participation by SECURIUM FOX.
- Training Contents
- Cyber Security Fundamentals
- Physical Security
- Secure Setup
- User Management
- Password Security
9- Basic Security Configurations
- Packet Management Hardening
- Service Hardening
- File System Security
- Firewall Using
- SE Linux Using
- Logging Infrastracture
- Vulnerability Discovery Practices
- Intrusion Detection Systems
- Backup Processes
- Applications
10You can always contact with SECURIUM FOX. You can
contact us through our email addresses or by
using the contact form on the side.
- INFO
- 3rd Floor,Lohia Towers,
- Nirmala Convent Rd,
- Gurunanak Nagar,Patamata,Vijyawada,
- Andhra Pradesh -520010
- 9652038194
- 08666678997
- info_at_securiumfoxtechnologies.com
11- info_at_securiumfoxtechnologies.com
- Andhra Pradesh Office
- 91 8666678997,91 91652038194
- 3rd Floor,Lohia Towers,
- Nirmala Convent Rd,Gurunanak Nagar,Patamata,Vijaya
wada, - info_at_securiumfoxtechnologies.com
- UK Office
- 44 2030263164
- Velevate, Kemp House, 152 - 160,City Road,EC1V
2NX - London
- info_at_securiumfoxtechnologies.com
- Tamil Nadu Office
- 91 9566884661
- Kailash Nagar, Nagar, Tiruchirappalli, Tamil Nadu
620019 - info_at_securiumfoxtechnologies.com
- Noida Office
- 91 (120) 4291672, 91 9319918771
- A-25, Block A,
- Second Floor,Sector - 3,
- Noida, India
- info_at_securiumfoxtechnologies.com
- USA Office
- 1 (315)933-3016
- 33 West,17th Street,
- New York,
- NY-10011, USA
- info_at_securiumfoxtechnologies.com
- Dubai Office
- 971 545391952
- Al Ansari Exchange, Ansar Gallery - Karama
Branch, Hamsah-A Building - 3 A St - Dubai -
United Arab Emirates