30 Hours(For Regular Course)
4-8 Hours(For Capsule Course)
This web-based training course on Securing Linux/Unix functionality, administration and development, is available online to all individuals, institutions, corporates and enterprises in India (New Delhi NCR, Bangalore, Chennai, Kolkatta), US, UK, Canada, Australia, Singapore, United Arab Emirates (UAE), China and South Africa. No matter where you are located, you can enroll for any training with us - because all our training sessions are delivered online by live instructors using interactive, intensive learning methods.
Linux and Unix are two operating systems that are most used globally when it comes to hardcore application development and programming. Being used in the most sensitive and security specific industrial domains, securing Linux and Unix platforms is of utmost importance to provide the organizations with fail-safe and issue-free working environment. A number of Linux and Unix security issues including specific configuration guidance and eliminating vulnerabilities are of utmost importance while securing Linux and Unix platforms. The various Unix and Linux security loopholes include password authentication system, file system, virtual memory system and securing other applications which mostly run on Linux and Unix.
This Linux And Unix security online course provides the trainees with the definitive skills of implementing the various procedures and tools of securing Unix and Linux Systems. The various tools including SSH, AIDE, sudo, Isof and others will be detailed and taught about. This Linux/Unix security training course provides hands-on training with the focus on the practical aspects of the subject. Number of techniques such as memory attacks, buffer overflows, files system attacks and race conditions, Trojan horse programs and other rootkits will also be explored and detailed to the trainees. This course is well suited for both beginners and professionals and has no prerequisites for its enrollment. However, it will be useful if the trainees have a fundamental understanding of Unix and Linux operating system.
Memory Attacks and Overflows
Minimization of Vulnerability
Configuration of Boot-Time
Firewalls based on hostes
Rootkits and Malicious Software
Assessment of File Integrity
Controls of User Access
Controlling Root Access With Sudo
Kernel Tuning to implement Security
Linux/Unix Logging Overview
Firewalls for Web Application with mod security
Tools to be used
Response to Incident and Acquisition of Evidence
Analysis of Media
SELinux and the Reference Policy
Unix and Linux operating systems are currently the most important operating systems used in organizations for development and RnD. Operating in such sensitive domains, the importance of their security is unparalleled. Consequently, the professionals who are experts in Unix and Linux security are highly sought after and are provided with immense and lucrative job and career opportunities. Becoming a Linux and Unix security expert through this course will take the trainees to various places and levels of the industry to grow and shoot their careers. This Linux and Unix online course comes highly recommended for security professionals, Unix/Linux administrators, Auditors and other such professionals.
1. Are lab-sessions available after theory sessions?
We provide online lab facilities to all our students, wherever possible & applicable, using a combination of one or more options, including global ASP setups, live-environments, real-time simulations, training-videos, PPTs, Screenshots and others.
2. Who and how qualified are the instructors?
All our instructors go through a rigorous and multiple processes of filtering and selection before they are appointed by us. Only the most qualified, most experienced and best suited candidates are chosen as instructors.
3.What are the machine requirements for the course?
You must have a fairly good desktop PC or laptop. You can even access these courses on your tabs or smart phones. For PCs and laptops the configuration should be at-least an Intel Pentium processor, 4GB of RAM and 50 to 100 GB of free hard disk space. You must also have a good and steady WiFi internet connection which works at 3G or 4G speeds.
4.How will I undergo practical training in the course?
Depending on the type of lab facilities available for the course you have enrolled in for our instructor would be happy to help you in your lab sessions.
5.What is the process to get my questions/queries answered?
Get in touch with your trainer. You can also consult your batch-mates. We believe in collaborative and practical learning.
6.Can a free demo session be provided?
We do not provide free demo sessions.
7.Will there be a provision for repetition if I miss a class?
We encourage our trainees to attend all sessions. If you have missed a session we will try out best to update you on it, if possible. Else you will need to pay a small fee to have a repeat session arranged specifically for you.
8.Does your organization provide assistance in job hunting?
We are connected across the industry in India and abroad. We will pass on any job openings from our customer to our trainees. But we are not a manpower placement provider.
9.How and where can I make the payment?
You can pay using any credit or debit card in India or abroad. You can also pay using your PayPal account.
10. Will practice material or tests be also provided with the course?
Yes. As required & as applicable.
11.What is the minimum or maximum batch size?
Minimum/maximum batch sizes vary from course to course, depending upon a number of factors. It can vary from as few as 2 to as many as a few hundred, in some cases. But that number does not impact the quality of training that we deliver due to our tight quality-control mechanisms.
All trainees will be provided with a course participation and completion certificate by Aurelius Corporate Solutions. Please note, we are an independent provider of learning solutions. We are not affiliated in any manner to any company or organization.