Cyber Security
Cyber Security
Objective
1.Develop skills to manage a Linux server and provide basic security to the server
4. Hands on experience on various tools & techniques of vulnerability assessment & penetration testing
used in Linux and shall pursue a career in penetration testing domain
Learning outcome
1.1 Access the command line, Recovery of the root user password
1.2 Managing files from the command line
1.3 Creating,Viewing,and Editing Text Files
1.4 Managing Local Linux Users and Groups
1.5 Linux File System Permissions
1.6 Monitoring and Managing Linux Processes
1.7 Archiving and Copying Files Between Systems
1.8 Installing and Updating Software Packages
1.9 Accessing Linux File Systems
1.10 Linux Networking
1.11 Analyzing and Storing Logs
1.12 Configuring and Securing OpenSSH Service
1.13 Using Regular Expressions with grep
1.14 Scheduling Future Linux Tasks
1.15 ACLs
1.16 SELinux Security
1.17 Adding Disks, Partitions, and File Systems to a Linux System
1.18 Managing Logical Volume Management (LVM) Storage
1.19 Boot Process
1.20 Managing different services using systemctl
1.21 Planning and Configuring Security Updates
1.22 Basics of System Auditing
1.23 Security guidelines during installation
1.24 Configuring firewalld
1.25 Compliance Policy and Vulnerability Scanning With OPENSCAP
Text Books:
1. Soyinka Wale, Linux Administration A Beginners Guide ,Mcgrawhill HED, Sixth
Edition
2. Jon Erickson , Hacking: The Art of Exploitation, No Starch Press, US, Second Edition
3. CCNA - Routing And Switching Study Guide by Todd Lammle
Reference Books:
1. Patrick Engebretson,, The Basics of Hacking and Penetration Testing: Ethical Hacking
and Penetration, Syngress Media,U.S, Second Edition
2. Designing Storage Area Networks – Second Edition – Tom Clark
3. http://ptac.ed.gov/sites/default/files/issue-brief-threats-to-your-data.pdf
Sample Project
1. Password Security
2. System Auditing