Here is a structured course outline for Linux for Cyber Security – Level Two (advanced level building on the fundamentals).
Linux for Cyber Security – Level Two
Course Outline
Module 1: Advanced Linux Command Line
- Advanced file manipulation commands
- Searching files with
grep, find, and locate
- Working with pipes and redirection
- Command chaining and scripting basics
- Managing processes (
top, htop, ps, kill)
Module 2: Linux File System Security
- Understanding Linux file system hierarchy
- Advanced file permissions and ownership
- Special permissions (SUID, SGID, Sticky Bit)
- Securing sensitive files and directories
- Disk usage monitoring and management
Module 3: User and Privilege Management
- Advanced user and group administration
- Understanding
sudo and privilege escalation
- Managing password policies
- Securing user accounts
- Monitoring user activities
Module 4: Network Configuration and Security
- Viewing network configurations (
ifconfig, ip)
- Network troubleshooting tools
- Managing network services
- Firewall configuration with
iptables and ufw
- Securing remote access with SSH
Module 5: Linux Security Monitoring and Logs
- Understanding Linux logging system
- Working with
journalctl
- Analyzing authentication logs
- Detecting suspicious login attempts
- Monitoring system performance and activities
Module 6: Introduction to Penetration Testing Tools
- Overview of penetration testing in Linux
- Installing security tools
- Introduction to:
- Nmap for network scanning
- Wireshark for packet analysis
- Netcat for network testing
- Ethical use of security tools
Module 7: Malware and Intrusion Detection
- Identifying malicious processes
- Checking system integrity
- Using tools like
chkrootkit and rkhunter
- Detecting rootkits and backdoors
- Incident response basics
Module 8: Bash Scripting for Security Automation
- Bash scripting fundamentals
- Writing scripts for security monitoring
- Automating log analysis
- Automating system updates and security checks
- Scheduling tasks with
cron
Module 9: System Hardening
- Securing Linux services
- Disabling unnecessary services
- Kernel security basics
- Security updates and patch management
- Best practices for Linux hardening
Module 10: Practical Labs and Projects
- Configuring a secure Linux server
- Performing a network scan using Nmap
- Analyzing logs for suspicious activities
- Creating a security monitoring script
- Final practical assessment
Leave a Reply