CompTIA® Linux+ 2004: Security


Overview/Description
Target Audience
Expected Duration
Lesson Objectives
Course Number


Overview/Description
This series covers basic installation, operation, and troubleshooting operating systems on workstations and servers. The learner will be able to explain fundamental open source resources/licenses, demonstrate knowledge of user administration, understand file permissions/software configurations and manage local storage devices and network protocols. When all five courses are taken in the Linux+ series (16260, 16261, 16262, 16263, & 16264), this is an authorized self-study program to help prepare learners for the CompTIA® Linux+ certification exam.

Target Audience
The audience includes Professionals who want to certify their technical knowledge in basic installation, operation and troubleshooting for Linux operating systems..

Expected Duration (hours)
4.0

Lesson Objectives

CompTIA® Linux+ 2004: Security

  • Identify features of algorithms used for encrypting passwords.
  • Identify password controls that enforce strong passwords.
  • Identify fields used for configuring password aging settings.
  • Identify characteristics of the Pluggable Authentication Modules (PAM) facility.
  • Identify features of the Pluggable Authentication Module (PAM) modules.
  • Identify features of the pam_limits module in the Pluggable Authentication Module (PAM) facility.
  • Identify key aspects of removing user accounts.
  • Identify methods for disabling logins.
  • Identify considerations for providing appropriate access to system resources.
  • Identify features of the sudo command.
  • Identify key security vulnerabilities in a Linux system.
  • Identify methods for securing network services.
  • Identify features of secure shell (SSH).
  • Identify access modes for manipulating file permissions.
  • Identify utilities for monitoring the integrity of files on a system.
  • Identify ways in which an Intrusion Detection System (IDS) works.
  • Identify ways to configure Snort.
  • Identify key aspects of PortSentry.
  • Identify key aspects of Linux Intrusion Detection System (LIDS).
  • Identify key aspects of IP filtering.
  • Identify options for configuring SuSEfirewall2.
  • Identify key aspects of log and accounting files.
  • Identify features of basic utilities for monitoring system log files.
  • Course Number:
    en_US_16263_ng