
English | Size: 10.56 GB
Genre: eLearning
These days we hear that the security of the Linux operating system is much higher than other operating systems. In other words, this statement is true and by default the Linux operating system has a better security factor in terms of structure and by default than other operating systems. But in every environment and every specific project that we use this operating system; In addition to the hypothetical security tips included in this operating system, there are other things that can be considered for the security of this operating system as needed
Course Syllabus
SEC506.1: Hardening Linux / Unix Systems, Part 1
SEC506.2: Hardening Linux / Unix Systems, Part 2
SEC506.3: Hardening Linux / Unix Systems, Part 3
SEC506.4: Application Security, Part 1
SEC506.5 : Application Security, Part 2
SEC506.6: Digital Forensics for Linux / Unix
SEC506: Securing Linux / Unix provides in-depth coverage of Linux and Unix security issues that includes specific configuration guidance and practical, real-world examples, tips, and tricks. We examine how to mitigate or eliminate general problems that apply to all Unix-like operating systems, including vulnerabilities in the password authentication system, file system, virtual memory system, and applications that commonly run on Linux and Unix.
The course will teach you the skills to use freely available tools to handle security issues, including SSH, AIDE, sudo, lsof, and many others. SANS ‘practical approach uses hand-on exercises every day to ensure that you will be to use these tools as soon as you return to work. We will also put these tools to work in a special section that covers simple forensic techniques for investigating compromised systems.
Memory Attacks, Buffer Overflows
File System Attacks, Race Conditions
Trojan Horse Programs and Rootkits
Monitoring and Alerting Tools
Unix Logging and Kernel-Level Auditing
Building a Centralized Logging Infrastructure
Network Security Tools
SSH for Secure Administration
Server Lockdown for Linux and Unix
Controlling Root Access with sudo
SELinux and chroot () for Application Security
DNSSEC Deployment and Automation
mod_security and Web Application Firewalls
Secure Configuration of BIND and Apache
Forensics Investigation of Linux Systems


https://nitroflare.com/view/83F578F31622FDC/506.part01.rar
https://nitroflare.com/view/5D806061486D691/506.part02.rar
https://nitroflare.com/view/6B752CABCEBE093/506.part03.rar
https://nitroflare.com/view/2BE871E422CE50F/506.part04.rar
https://nitroflare.com/view/D2BDB99BF99DFC6/506.part05.rar
https://nitroflare.com/view/FE2C51CC84F3971/506.part06.rar
https://nitroflare.com/view/D147D1E32076753/506.part07.rar
https://nitroflare.com/view/50D4ECC86A4E668/506.part08.rar
https://nitroflare.com/view/CCDC2A44FFE9D1A/506.part09.rar
https://nitroflare.com/view/BA120D1F261DE69/506.part10.rar
https://nitroflare.com/view/0AC85070D787AAE/506.part11.rar

https://rapidgator.net/file/870200edee7a305da7096ab907640374/506.part01.rar.html
https://rapidgator.net/file/e2d8ca60a765e86552101241164c5d9b/506.part02.rar.html
https://rapidgator.net/file/d8cac6ee52d4a24d997b9cd235a5dd28/506.part03.rar.html
https://rapidgator.net/file/c4a2e393bfd7dea6a9b16e4f6b411c39/506.part04.rar.html
https://rapidgator.net/file/147f5309ebc60ad1f5db01294e962211/506.part05.rar.html
https://rapidgator.net/file/a11c5cbe9ad190fd199290d492e59165/506.part06.rar.html
https://rapidgator.net/file/a3906f62b6fddc92611c74aeefca99a1/506.part07.rar.html
https://rapidgator.net/file/20644cc5f9015bbebc0b313dc5e85dc7/506.part08.rar.html
https://rapidgator.net/file/acd4013739f17d8f8cc56d81633c2a88/506.part09.rar.html
https://rapidgator.net/file/a0cab24cf566b8e28913f5adfcc72a25/506.part10.rar.html
https://rapidgator.net/file/22633d2fe764ac46f6b477dcc2a041d0/506.part11.rar.html
Leave a Reply