Back

Security Strategies in Linux Platforms and Applications

Only demo functionality is available. Module 3 is active for you to review. If you would like further review access to any of the Jones & Bartlett courses please contact your Account Representative.

Table of Contents

  1. Course Introduction
    Study Guide
    ISSA Labs: Before you Begin
    Working with Virtual Labs
    Project Description
    Introduce Yourself
  2. Reading Assignment
    -eBook: Chapter 1 Security Threats to Linux
    Lecture Presentation: Introduction to Linux Security
    Discussion: Securing a Linux System
    Virtual Lab: Installing a Core Linux Operating System on a Server
    Assessment Worksheet for the Virtual Lab
  3. Reading Assignment
    -eBook: Chapter 4 User Privileges and Permissions
    Lecture Presentation: User Account Management
    Virtual Lab: Hardening Security with User Account Management and Security Controls
    Assessment Worksheet for the Virtual Lab
  4. Reading Assignment
    -eBook: Chapter 5 Filesystems, Volumes, and Encryption
    Lecture Presentation: Securing the Linux Filesystem
    Discussion: Compromising an Online System
    Virtual Lab: Applying Hardened Linux File System Security Controls
    Assessment Worksheet for the Virtual Lab
    Project Part 1: Executive Summary
  5. Reading Assignment
    -eBook: Chapter 6 Every Service Is a Potential Risk
    -eBook: Chapter 8 Networked Filesystems and Remote Access
    -eBook: Chapter 9 Networked Application Security
    Lecture Presentation: Securing Common Linux Services
    Virtual Lab: Hardening Security for Linux Services and Applications
    Assessment Worksheet for the Virtual Lab
  6. Reading Assignment
    -eBook: Chapter 7 Networks, Firewalls, and More
    Lecture Presentation: Using Layered Security for Access Control
    Discussion: Determining Firewall Rules
    Virtual Lab: Hardening Security by Controlling Access
    Assessment Worksheet for the Virtual Lab
  7. Reading Assignment
    -eBook: Chapter 10 Kernel Security Risk Mitigation
    Lecture Presentation: Securing the Linux Kernel
    Virtual Lab: Hardening Security for the Linux Kernel
    Assessment Worksheet for the Virtual Lab
    Project Part 2: Executive Summary
  8. Reading Assignment
    -eBook: Chapter 11 Managing Security Alerts and Updates
    Lecture Presentation: Software Management
    Discussion: Using Community and Vendor Support for Managing Software
    Virtual Lab: Applying Best Practices for Secure Software Management
    Assessment Worksheet for the Virtual Lab
  9. Reading Assignment
    -eBook: Chapter 12 Building and Maintaining a Security Baseline
    -eBook: Chapter 13 Testing and Reporting
    Lecture Presentation: Linux System Logging and Monitoring
    Virtual Lab: Applying Best Practices for Security Logging and Monitoring
    Assessment Worksheet for the Virtual Lab
  10. Reading Assignment
    -eBook: Chapter 14 Detecting and Responding to Security Breaches
    Lecture Presentation: Incident Response and Recovery
    Discussion: Creating a Backup Plan
    Virtual Lab: Defining Linux OS and Application Backup and Recovery Procedures
    Assessment Worksheet for the Virtual Lab
    Project Part 3: Executive Summary
  11. Project Part 4: Final Project Submission
    Final Exam


Copyright © 2016 Jones & Bartlett Learning. All rights reserved