30 Hours(For Regular Course)

4-8 Hours(For Capsule Course)

Enroll Now

Request more information

Securing Linux/Unix

This web-based training course on Securing Linux/Unix functionality, administration and development, is available online to all individuals, institutions, corporates and enterprises in India (New Delhi NCR, Bangalore, Chennai, Kolkatta), US, UK, Canada, Australia, Singapore, United Arab Emirates (UAE), China and South Africa. No matter where you are located, you can enroll for any training with us - because all our training sessions are delivered online by live instructors using interactive, intensive learning methods.

Linux and Unix are two operating systems that are most used globally when it comes to hardcore application development and programming. Being used in the most sensitive and security specific industrial domains, securing Linux and Unix platforms is of utmost importance to provide the organizations with fail-safe and issue-free working environment. A number of Linux and Unix security issues including specific configuration guidance and eliminating vulnerabilities are of utmost importance while securing Linux and Unix platforms. The various Unix and Linux security loopholes include password authentication system, file system, virtual memory system and securing other applications which mostly run on Linux and Unix.

This Linux And Unix security online course provides the trainees with the definitive skills of implementing the various procedures and tools of securing Unix and Linux Systems. The various tools including SSH, AIDE, sudo, Isof and others will be detailed and taught about. This Linux/Unix security training course provides hands-on training with the focus on the practical aspects of the subject. Number of techniques such as memory attacks, buffer overflows, files system attacks and race conditions, Trojan horse programs and other rootkits will also be explored and detailed to the trainees. This course is well suited for both beginners and professionals and has no prerequisites for its enrollment. However, it will be useful if the trainees have a fundamental understanding of Unix and Linux operating system.

Memory Attacks and Overflows

  • Overflows of Stack and Heap
  • Format String Attacks
  • Protection of Stack

Minimization of Vulnerability

  • Minimization against Patching
  • Minimization of OS
  • Strategies of Patching

Configuration of Boot-Time

  • Reduction in Services
  • systemd vs init
  • Configuration of Emails
  • Services of Legacy

Access encryption

  • Session Hijacking
  • Arguments For Encryption
  • Configurations of SSH

Firewalls based on hostes

  • IP Tables and Alternatives
  • Single-Host Firewalls
  • Management and Automation of Rule Updates

Rootkits and Malicious Software

  • Backdoors and Rootkits
  • Kernel Rootkits
  • chkrootkit and rkhunter

Assessment of File Integrity

  • Introduction to AIDE
  • Basic Configurations
  • Typical Usage

Controls of User Access

  • Threats and Defenses in Password
  • User Access Controls
  • Settings of the Environment

Controlling Root Access With Sudo

  • Features and Uses
  • Configuration
  • Known Issues and Working around them

Warning Banners

  • Suggested Content for warning banners
  • Implementation Issues in warning banners

Kernel Tuning to implement Security

  • Network Tuning
  • System Resource Limits
  • Restricting Core Files

Linux/Unix Logging Overview

  • Syslog Configuration
  • Accounting of System
  • Accounting of Process
  • Auditing at the Kernel-Level

Firewalls for Web Application with mod security

  • Overview of Common Configurations
  • Dependencies and Prerequisites
  • Core Rules
  • Installation and Debugging procedures

Tools to be used

  • The Sleuth Kit
  • Foremost
  • chkrootkit
  • lsof and Other Critical OS Commands

Forensic Preparation

  • Forensic Principles
  • Infrastructure of Forensic
  • Desktop Analysis Laboratory creation

Response to Incident and Acquisition of Evidence

  • Process of Incident Response
  • Important Investigation Tools
  • Taking Live System Snapshots
  • Bit Images creations

Analysis of Media

  • Basics of File System
  • MAC Times and Analysis of Timeline
  • Deleted Files Recovery
  • Unallocated Space Search
  • String Searche

SELinux and the Reference Policy

  • Tools and Prerequisites in SELinux
  • Creating and Loading Initial Policies
  • Testing and Refining Policies
  • Policy Files deployement


  • Security Issues with BIND
  • Split-horizon DNS
  • Security Configuration
  • Running of BIND chroot()ed


  • Issues in Implementation
  • Keys and Signing Zones generation
  • Key "Rollover"
  • Automation Tools


  • Securing Directory Configurations
  • Configuration and Installation Choices
  • Authentication of user

Unix and Linux operating systems are currently the most important operating systems used in organizations for development and RnD. Operating in such sensitive domains, the importance of their security is unparalleled. Consequently, the professionals who are experts in Unix and Linux security are highly sought after and are provided with immense and lucrative job and career opportunities. Becoming a Linux and Unix security expert through this course will take the trainees to various places and levels of the industry to grow and shoot their careers. This Linux and Unix online course comes highly recommended for security professionals, Unix/Linux administrators, Auditors and other such professionals.

1. Are lab-sessions available after theory sessions?

We provide online lab facilities to all our students, wherever possible & applicable, using a combination of one or more options, including global ASP setups, live-environments, real-time simulations, training-videos, PPTs, Screenshots and others.

2. Who and how qualified are the instructors?

All our instructors go through a rigorous and multiple processes of filtering and selection before they are appointed by us. Only the most qualified, most experienced and best suited candidates are chosen as instructors.

3.What are the machine requirements for the course?

You must have a fairly good desktop PC or laptop. You can even access these courses on your tabs or smart phones. For PCs and laptops the configuration should be at-least an Intel Pentium processor, 4GB of RAM and 50 to 100 GB of free hard disk space. You must also have a good and steady WiFi internet connection which works at 3G or 4G speeds.

4.How will I undergo practical training in the course?

Depending on the type of lab facilities available for the course you have enrolled in for our instructor would be happy to help you in your lab sessions.

5.What is the process to get my questions/queries answered?

Get in touch with your trainer. You can also consult your batch-mates. We believe in collaborative and practical learning.

6.Can a free demo session be provided?

We do not provide free demo sessions.

7.Will there be a provision for repetition if I miss a class?

We encourage our trainees to attend all sessions. If you have missed a session we will try out best to update you on it, if possible. Else you will need to pay a small fee to have a repeat session arranged specifically for you.

8.Does your organization provide assistance in job hunting?

We are connected across the industry in India and abroad. We will pass on any job openings from our customer to our trainees. But we are not a manpower placement provider.

9.How and where can I make the payment?

You can pay using any credit or debit card in India or abroad. You can also pay using your PayPal account.

10. Will practice material or tests be also provided with the course?

Yes. As required & as applicable.

11.What is the minimum or maximum batch size?

Minimum/maximum batch sizes vary from course to course, depending upon a number of factors. It can vary from as few as 2 to as many as a few hundred, in some cases. But that number does not impact the quality of training that we deliver due to our tight quality-control mechanisms.

All trainees will be provided with a course participation and completion certificate by Aurelius Corporate Solutions. Please note, we are an independent provider of learning solutions. We are not affiliated in any manner to any company or organization.

Copyright © 2016 Aurelius Corporate Solutions Pvt. Ltd. All Rights Reserved.