Linux Hacking


Overview/Description
Target Audience
Prerequisites
Expected Duration
Lesson Objectives
Course Number



Overview/Description
The various distributions of Linux are becoming more and more popular. This course examines the history of Linux, the different flavors that are available, and the file structures used. This course also examines the methods that can be used to secure Linux systems, along with the tools that can be used both to test the security, and to penetrate it. Finally, this course examines the countermeasures that can be put in place to maintain the security of Linux systems. This course also assists students who are preparing for the EC Council's Ethical Hacking and Countermeasures (CEHv6) exam 312-50.

Target Audience
Existing or in-training IT security professionals seeking detailed security penetration testing skills.

Prerequisites
A technical background with a solid understanding of networks and networking concepts, such as TCP/IP, IP Routing, and LAN Switching, as well as Windows and/or UNIX/LINUX operating systems; a general familiarity with the principles and usage of command-line, coding, and GUI-based technologies for manipulating IT operating systems

Expected Duration (hours)
1.0

Lesson Objectives

Linux Hacking

  • sequence the steps to compile a Linux kernel
  • assign specific permissions to a file or directory in Linux
  • recognize the purposes of Linux hacking tools
  • recognize the purpose of Linux security tools
  • recognize where information is stored in Linux and basic Linux commands
  • recognize the commands for scanning and remote control for certain Linux hacking tools
  • recognize how to assign permissions to users, groups, and others in Linux
  • Course Number:
    sp_etih_a07_it_enus