CURRICULUM: Cyber Defense 5 Day Program 30 CPEs 40 Labs You Will Be Able To ▐ Navigate the Linux command line confidently and efficiently Secure Linux systems by applying hardening techniques and best practices ▐ Configure and manage user authentication, access controls, and permissions ▐ Audit Linux systems and analyze security logs for threat detection ▐ Manage system processes, monitor performance, and optimize resource usage Implement incident response techniques for Linux-based security events ▐ Secure remote administration using SSH, SCP, and OpenSSL Configure firewalls and secure Linux network communications ▐ Install, update, and manage Linux software securely using package management Who Should Attend ▐ Anyone who manages Linux servers and is responsible for ensuring the security of those systems ▐ Everyone who deploys and manages applications on Linux-based cloud solutions ▐ Security professionals who want to learn about Linux security best practices and how to implement them in their organization. ▐ Technology professionals who want to gain a deeper understanding of Linux security concepts and improve their skills in securing Linux systems ▐ Anyone interested in learning about Linux security and how to protect their organization’s systems and data from cyber threats Secure, Command, Protect: Practical Linux Security Training Most new InfoSec professionals are more familiar with Windows than Linux, yet many of the critical tools used in today’s offensive, defensive, ICS, and forensics positions require a strong understanding of Linux. This presents a serious challenge for those without the requisite experience because these systems are frequently utilized in highly exposed environments such as DMZs and the cloud. The irony is that now our information security platforms are creating new security risks. This Linux security course solves the problem by offering numerous hands-on exercises allowing students to quickly develop the Linux skills necessary to become a valuable asset to any Information Security team. This Linux security training focuses on the fundamental aspects of Linux administration, covering topics such as configuring a secure Linux system, working with the command line, and managing users and permissions. It also emphasizes the security aspects of these skills, teaching students how to secure their Linux systems and defend against potential attacks. You will learn how a misconfiguration introduces a vulnerability, how to attack that vulnerability and how to mitigate those risks. Upon completing the course, students will have the knowledge and skills required to secure Linux systems, identify potential security threats, and implement appropriate measures to prevent them. With our course, you can gain the experience necessary to become a skilled and confident Linux user, ensuring that you are an asset rather than a liability to your employer. Syllabus Summary SECTION 1: Linux Command Line SECTION 2: Shell Syntax and Account Management SECTION 3: File and User Access Control SECTION 4: Process and Log Management SECTION 5: Package, SSH, and Network Management SEC406: Linux Security for InfoSec Professionals™ “ Even though I have been using Linux for a while, I learned a lot things I didn’t know or understandand, and now it makes sense.” —John R., U.S. Military “ I really liked the way the course was presented— great flow and easy to follow along with.” —Christopher Hannon, SEC406 student For detailed course description, visit SANS.ORG/SEC406 WAYS TO TAKE SEC406 Live Online OnDemand Mark Baggett Course Author Charles Goldner Course Author