Top Banner
LINUX Security, Firewalls & Proxies
29

LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand.

Dec 25, 2015

Download

Documents

Junior Brown
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand.

LINUX Security, Firewalls & Proxies

Page 2: LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand.

Course Title

• Introduction to LINUX Security Models

Objectives

• To understand the concept of system security

• To understand the need for secured systems

• Introduction to Intrusion Detection, Firewalls & Proxies

Introductory Course

Page 3: LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand.

Introductory Course…

Training Road Map

• Understanding the security triangle – confidentiality, integrity & availability

• Introduction to Linux Security Model • Traditional Security Architecture• Authentication & access control mechanisms• Secure Operating Systems• Partitioning and File System Security• Security Updates• Log Concept• Services and Protocols • Secure remote administration

Page 4: LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand.

Introductory Course…

Training Road Map…

• Firewall

• Introduction

• TCP/IP Recap

• iptables (Netfilter)

• Implementation

• Management

• Proxies

• Simulated Attack

Page 5: LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand.

• Duration

• 8 hours (6 hours lecture + 2 hours laboratory)

• Pre-requisites

• Basic LINUX commands

• Trainer requirement

• Good understanding of the LINUX System

• Advanced LINUX commands

• System Administration

• Understanding on Networking concepts, IP addresses, subnets, etc

• Excellent understanding of security models & their implementation

Introductory Course…

Page 6: LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand.

• System requirements• Hardware

• Cluster (independent of the main network) with atleast two server nodes

• Terminal for each participant• Software

• OS• Tools for ethical hacking• Firewall• Proxy• IDS / IPS

Introductory Course…

Page 7: LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand.

• Course material

Introductory Course…

Page 8: LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand.

Course Title

• LINUX Security - Intermediate

Objectives

• To understand the concept of system security

• To understand the need for secured systems

• To be able to implement Intrusion Detection, Firewalls & Proxies

Linux security – Intermediate

Page 9: LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand.

Training Road Map

• Understanding the security triangle – confidentiality, integrity & availability

• Introduction to Linux Security Model

• Traditional Security Architecture

• Authentication & access control mechanisms

• Partitioning and File System Security

• Security Updates

• Log Concept

• Services and Protocols

• Secure remote administration

Linux security – Intermediate

Page 10: LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand.

Training Road Map…

• Cryptography Basics

• SSL and VPN

• Securing Remote Access into the server

• Securing Apache

• Application-Level Gateway Basics

• IDS and IPS

Linux security – Intermediate

Page 11: LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand.

Training Road Map…

• Firewall

• Introduction

• Need for firewall

• TCP/IP concept recap

• TCP/IP model

• Common protocols - TCP, UDP, IP, ICMP

• TCP 3 way handshake

Linux security – Intermediate

Page 12: LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand.

Training Road Map…

• Firewall…

• Types of firewalls

• Working principles (at what level / layer does it do the checking)

• Software / hardware based firewall

• Packet filtering

• iptables basic configurations and usage, chains

• Practical implementations

• firewall management (using firewall script / ruleset software)

• GUI based / web based

Linux security – Intermediate

Page 13: LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand.

Training Road Map…

• Firewall…

• Further reading/discussion

• Firewall, why is it not enough

• Other threats that cannot be detected

• Firewall, as one of the options, not a means to solve security problems

• sample of combination with firewall usage

• IDS ? IPS ? what next? Proxies

Linux security – Intermediate

Page 14: LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand.

• Proxies

• Introduction

• Configuring

• Audit and Log

Linux security – Intermediate

Page 15: LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand.

• Duration

• 24 hours (18 hours lecture + 6 hours laboratory)

• Pre-requisites

• Basic LINUX commands

• Trainer requirement

• Good understanding of the LINUX System

• Advanced LINUX commands

• System Administration

• Understanding on Networking concepts, IP addresses, subnets, etc

• Excellent understanding of security models & their implementation

Linux security – Intermediate

Page 16: LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand.

• System requirements• Hardware

• Cluster (independent of the main network) with atleast two server nodes

• Terminal for each participant• Software

• OS• Tools for ethical hacking• Firewall• Proxy• IDS / IPS

Linux security – Intermediate

Page 17: LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand.

• Course material

Linux security – Intermediate

Page 18: LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand.

Course Title

• LINUX Security - Advanced

Objectives

• To understand the concept of system security

• To understand the need for secured systems

• To be able to implement Intrusion Detection, Firewalls & Proxies

• To understand possible vulnerabilities of unstable proxies and solutions

Linux security – Advanced

Page 19: LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand.

Training Road Map

• Understanding the security triangle – confidentiality, integrity & availability

• Introduction to Linux Security Model

• Traditional Security Architecture

• Authentication & access control mechanisms

• Secure Operating Systems

• Partitioning and File System Security

Linux security – Advanced

Page 20: LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand.

Training Road Map…

• Security Updates

• Log Concept

• Services and Protocols

• Secure remote administration

• Vulnerabilities, threats & exploits

Linux security – Advanced

Page 21: LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand.

Training Road Map…

• Cryptography Basics

• SSL and VPN

• Securing Remote Access into the server

• Securing Apache

• Application-Level Gateway Basics

• IDS and IPS

• Security awareness, Security policies, Security implementation & Change Management

Linux security – Advanced

Page 22: LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand.

Training Road Map…

• Firewall

• Introduction

• Need for a firewall

• TCP/IP concept recap

• TCP/IP model

• Common protocols - TCP, UDP, IP, ICMP

• TCP 3 way handshake

Linux security – Advanced

Page 23: LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand.

Training Road Map…

• Firewall…

• Types of firewalls

• Working principles (at what level / layer does it do the checking)

• Software / hardware based firewall

• Packet filtering

• iptables basic configurations and usage, chains

• Practical implementations

• firewall management (using firewall script / ruleset software)

• GUI based / web based

Linux security – Advanced

Page 24: LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand.

Training Road Map…

• Firewall…

• Further reading/discussion

• Firewall, why is it not enough

• other threats that cannot be detected

• as one of the options, not a means to solve all security problems

• sample of combination with firewall usage

• IDS ? IPS ? what next? Proxies

Linux security – Advanced

Page 25: LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand.

• Proxies

• Intoduction

• Configuring

• Vulnerabilities of unstable proxies & solutions

• Audit and Log

• Database level security

• Introduction to Ethical Hacking

• Analysing your server security (e.g.: detecting/preventing Trojans, backdoors, bruteforce attack)

• DDoS attack

Linux security – Advanced

Page 26: LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand.

• Duration• 10 days (each day with 6 hours lecture + 2 hours

laboratory)

• Pre-requisites• Basic LINUX commands

• Trainer requirement• Good understanding of the LINUX System• Advanced LINUX commands• System Administration• Understanding on Networking concepts, IP

addresses, subnets, etc• Excellent understanding of security models & their

implementation

Linux security – Advanced

Page 27: LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand.

• System requirements• Hardware

• Cluster (independent of the main network) with atleast two server nodes

• Terminal for each participant• Software

• OS• Tools for ethical hacking• Firewall• Proxy• IDS / IPS

Linux security – Advanced

Page 28: LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand.

• Course material

Linux security – Advanced

Page 29: LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand.

Thank You