Practical Linux for Security Professionals
- Offered byEC-Council
Practical Linux for Security Professionals at EC-Council Overview
Duration | 42 hours |
Total fee | ₹16,497 |
Mode of learning | Online |
Official Website | Go to Website |
Credential | Certificate |
Practical Linux for Security Professionals at EC-Council Highlights
- Earn a certificate after completion of the course
- Quizzes & Assessments for practice
Practical Linux for Security Professionals at EC-Council Course details
- Aspiring Security Professionals who want to get started using Linux
- Security Analyst
- DevSecOps
- System Engineer, and Sysadmin interested in learning how to improve Linux system security based on best practices for Linux server hardening
- Trace Linux process's and learn how an ELF file gets loaded and executed
- Learn about malware protection techniques and how to defeat them
- Secure Linux based infrastructure and avoiding any pitfalls that may lead to breaches
- Learn to develop a web application using Meteor.js
- Understand how to use rootkit detection tools
- Perform vulnerability assessments and how to set up and configure a SIEM
- Administer and support Linux in your environment
- Learning of how assembly language works and interacts with hardware
- This course provides practical insights into Linux security principles, tools, and techniques, equipping participants with the skills needed to secure Linux-based environments and respond to security incidents effectively
- This course equips participants with practical skills to secure Linux environments, making them valuable assets in roles related to cybersecurity, system administration, and ethical hacking
Practical Linux for Security Professionals at EC-Council Curriculum
Linux for Absolute Beginners
Linux Installation
Linux Command Line Interface (CLI) Essentials
Advanced CLI Usage
Installing and Mitigating Linux Rootkits
Operating Systems and Rootkits
Compromising Linux with a Rootkit
Detecting Rookits
Linux Hardening Deconstructed
Hardening Concepts
Filesystem Configuration
Services
Linux Forensics
Linux as an Architecture
Forensically Reviewing Linux
Linux 32-bit Reverse Engineering
Introduction to Reverse Engineering
Setting up the Lab Environment
Hands-on Binary Analysis in Linux - Part 1
Understanding ELF Binary Format
Basic Binary Analysis
Process Tracing
Hands-on Binary Analysis in Linux - Part 2
Software Protection Methods
Fundamental Malware Analysis
Linux Kernel Module and Rootkit Analysis
IT Security with Red Hat Made Easy
Introduction and Environment Preparation
Configure Intrusion Detection
Configure Encrypted Storage