LinuxCBT - Basic Security Edition

Član
Učlanjen(a)
31.12.2011
Poruka
4.869
3e56dcb7517c15bcdd5d41db9b99d164.jpg

LinuxCBT - Basic Security Edition Training | 1.24Gb


Course Objective

Basic Security - Module I

Boot Security
Explore Dell PowerEdge BIOS Security-related features
Discuss concepts & improve Dell PowerEdge BIOS security
Explain run-time boot loader vulnerabilities
Explore single-user mode (rootshell) and its inherent problems
Modify default GRUB startup options & examine results
Secure boot loader using MD5 hash
Identify key startup-related configuration files & define boot security measures
Identify key boot-related utilities
Confirm expected hardware configuration
Discuss INIT process, runlevel configuration & concepts
Explore & tighten the security of the INIT configuration

Shell Security
Confirm expected applications
Discuss Teletype Terminals (TTYs) and Pseudo Terminals (PTS)
Identify common TTYs and PTSs
Track current TTYs and PTSs - character devices
Discuss concepts related to privileged and non-privileged use
Restrict privileged login
Use SSH and discuss TTYs
Discuss the importance of consistent system-wide banners & messages
Define and configure system banners for pre and post-system-access
Identify user-logon history and correlate to TTYs
Identify current user-connections - console-based and network-based
Use lsof to identify open files and sockets

Syslog Security
Discuss Syslog concepts and applications
Explain Syslog semantics - facilities & levels - message handling & routing
Focus on security-related Syslog facilities
Examine security logs managed by Syslog
Configure Network Time Protocol (NTP) on interesting hosts
Secure NTP configuration
Ensure time consistency to preserve log-integrity
Configure Syslog replication to preserve log-integrity
Identify log discrepancies between Syslog hosts

Reconnaissance & Vulnerability Assessment Tools
Discuss Stage-1 host/network attack concepts
Upgrade NMAP reconnaissance tool to increase effectiveness
Identify NMAP files
Discuss TCP handshake procedure
Discuss half-open/SYN connections
Perform connect and SYN-based host/network reconnaissance
Identify potential vulnerabilities on interesting hosts derived from reconnaissance
Examine NMAP logging capabilities
Perform port sweeps to identify common vulnerabilities across exposed systems
Secure exposed daemons/services
Perform follow-up audit to ensure security policy compliance
Discuss vulnerability scanner capabilities and applications
Prepare system for Nessus vulnerability scanner installation - identify/install dependencies
Generate self-signed SSL/TLS certificates for secure client/server communications
Activate Nessus subscription, server and client components
Explore vulnerability scanner interface and features
Perform network-based reconnaissance attack to determine vulnerabilities
Examine results of the reconnaissance attack and archive results
Secure exposed vulnerabilities

XINETD - TCPWrappers - Chattr - Lsattr - TCPDump - Clear Text Daemons
Install Telnet Daemon
Install Very Secure FTP Daemon (VSFTPD)
Explore XINETD configuration and explain directives
Configure XINETD to restrict communications at layer-3 and layer-4
Restrict access to XINETD-protected daemons/services based on time range
Examine XINETD logging via Syslog
Discuss TCPWrappers security concepts & applications
Enhance Telnetd security with TCPWrappers
Confirm XINETD & TCPWrappers security
Discuss chattr applications & usage
Identify & flag key files as immutable to deter modifcation
Confirm extended attributes (XATTRs)
Discuss TCPDump applications & usage
Configure TCPDump to intercept Telnet & FTP - clear-text traffic
Use Ethereal to examine & reconstruct captured clear-text traffic

Secure Shell (SSH) & MD5SUM Applications
Use Ethereal to examine SSH streams
Generate RSA/DSA PKI usage keys
Configure Public Key Infrastructure (PKI) based authentication
Secure PKI authentication files
Use SCP to transfer files securely in non-interactive mode
Use SFTP to transfer files securely in interactive mode
Configure SSH to support a pseudo-VPN using SSH-Tunnelling
Discuss MD5SUM concepts and applications
Compare & contrast modified files using MD5SUM
Use MD5SUM to verify the integrity of downloaded files

GNU Privacy Guard (GPG) - Pretty Good Privacy (PGP) Compatible - PKI
Discuss GPG concepts & applications - symmetric/asymmetric encryption
Generate asymmetric RSA/DSA GPG/PGP usage keys - for multiple users
Create a local web of trust
Perform encrypts/decrypts and test data-exchanges
Sign encrypted content and verify signatures @ recipient
Import & export public keys for usage
Use GPG/PGP with Mutt Mail User Agent (MUA)

AIDE File Integrity Implementation
Discuss file-integrity checker concepts & applications
Identify online repository & download AIDE
Install AIDE on interesting hosts
Configure AIDE to protect key files & directories
Alter file system objects and confirm modifications using AIDE
Audit the file system using AIDE

Rootkits
Discuss rootkits concepts & applications
Describe privilege elevation techniques
Obtain & install T0rnkit - rootkit
Identify system changes due to the rootkit
Implement T0rnkit with AIDE to identify compromised system objects
Implement T0rnkit with chkrootkit to identify rootkits
T0rnkit - rootkit - cleanup
Implement N-DU rootkit
Evaluate system changes

Bastille Linux - OS-Hardening
Discuss Bastille Linux system hardening capabilities
Obtain Bastille Linux & perform a system assessment
Install Bastille Linux
Evaluate hardened system components

NPING - Flexible Packet Crafting
Discuss benefits
Download and install
Explore typical usage

Nikto - Web Server Vulnerability Scanner
Download and install
Discuss configuration options
Scan web servers
Evaluate results

With a Premium account you can download files having Fullspeed !
Download from Uploaded
Kod:
http://uploaded.net/file/4a5xbtkm/LinuxCBT.Basic.Security.Edition.part01.rar
http://uploaded.net/file/u36my8tz/LinuxCBT.Basic.Security.Edition.part02.rar
http://uploaded.net/file/n3nasn4u/LinuxCBT.Basic.Security.Edition.part03.rar
http://uploaded.net/file/vafad88w/LinuxCBT.Basic.Security.Edition.part04.rar
http://uploaded.net/file/dd27w3lb/LinuxCBT.Basic.Security.Edition.part05.rar
http://uploaded.net/file/nyo7pye8/LinuxCBT.Basic.Security.Edition.part06.rar
http://uploaded.net/file/u6nty2cz/LinuxCBT.Basic.Security.Edition.part07.rar
http://uploaded.net/file/04si2xtr/LinuxCBT.Basic.Security.Edition.part08.rar
http://uploaded.net/file/6picfurv/LinuxCBT.Basic.Security.Edition.part09.rar
http://uploaded.net/file/4twqzf8v/LinuxCBT.Basic.Security.Edition.part10.rar
http://uploaded.net/file/0ddwvy0a/LinuxCBT.Basic.Security.Edition.part11.rar
http://uploaded.net/file/7n19be0b/LinuxCBT.Basic.Security.Edition.part12.rar
http://uploaded.net/file/3v6ymumh/LinuxCBT.Basic.Security.Edition.part13.rar
Download from Lumfile
Kod:
http://lumfile.com/712x9ipcth83/LinuxCBT.Basic.Security.Edition.part01.rar
http://lumfile.com/6vsgpc0k3zsx/LinuxCBT.Basic.Security.Edition.part02.rar
http://lumfile.com/6k3bg7aguuwu/LinuxCBT.Basic.Security.Edition.part03.rar
http://lumfile.com/brwkhu7oh0ov/LinuxCBT.Basic.Security.Edition.part04.rar
http://lumfile.com/b3nqzxfkq0e8/LinuxCBT.Basic.Security.Edition.part05.rar
http://lumfile.com/8llep17akr07/LinuxCBT.Basic.Security.Edition.part06.rar
http://lumfile.com/muaeny6dcfe5/LinuxCBT.Basic.Security.Edition.part07.rar
http://lumfile.com/x0gtx595z7x3/LinuxCBT.Basic.Security.Edition.part08.rar
http://lumfile.com/68o2wvw5c8gx/LinuxCBT.Basic.Security.Edition.part09.rar
http://lumfile.com/ck7i5mdobz5s/LinuxCBT.Basic.Security.Edition.part10.rar
http://lumfile.com/duw3ysf4quj0/LinuxCBT.Basic.Security.Edition.part11.rar
http://lumfile.com/sil23tf3n230/LinuxCBT.Basic.Security.Edition.part12.rar
http://lumfile.com/hwb7wmwcbzha/LinuxCBT.Basic.Security.Edition.part13.rar
 
Natrag
Top