HSC
Network Security Consulting Agency Since 1989 - Specialized in Unix, Windows, TCP/IP and Internet
Text mode: access to the page content
Hervé Schauer Consultants
You are here: Home > Resources > Courses > Linux Security
Go to: HSC Trainings
Search:  
Version française
   Services   
o Skills & Expertise
o Consulting
o ISO 27001 services
o Vulnerabilities monitoring
o Audit & Assessment
o Penetration tests
o Vunerability assessment (TSAR)
o Forensics
o ARJEL
o Training courses
o E-learning
   Conferences   
o Agenda
o Past events
o Tutorials
   Resources   
o Thematic index
o Tips
o Lectures
o Courses
o Articles
o Tools (download)
o Vulnerability watch
   Company   
o Hervé Schauer
o Job opportunities
o Credentials
o History
o Partnerships
o Associations
   Press and
 communication
 
 
o HSC Newsletter
o Press review
o Press releases
o Publications
   Contacts   
o How to reach us
o Specific inquiries
o Directions to our office
o Hotels near our office
|>|Linux Security  
> Access to the content
O Module 1: theory
(Also available as one complete file)
O Module 2: practical work
(Also available as one complete file)
 
> Description The aim of this course is to introduce the security functionnalities provided by Linux, as well as the possible uses of Linux for information systems security.
This course is composed of two parts; a theoretical presentation in the morninf, followed by practical work in the afternoon.  
> Context & Dates Material of our Linux Security course.
The material available here is the one used during the Linux University on 9 December 1999; future sessions of this course may use a revised version of the slides.
 
> Author Denis Ducamp  
> Type Course material - [ - ]  
> Abstract &
Table of content
Module 1 : Théorie

1. Introduction

2. Linux et la sécurité

3. La sécurité du système

4. La sécurité du noyau Linux 2.2

5. La sécurité réseau

6. Conclusion

Module 2 : Travaux pratiques

1. Introduction

2. Sécurisation complète d'un serveur sous Linux

3. Mise en place d'un serveur WWW Apache

4. Mise en place d'un FireWall sous Linux avec IPchain

 
> Related documents
themeLinux
[Presentation]  Linux security characteristics [26 September 2000 - French/English]
[Presentation]  Overview of the main applications of Linux for security [26 April 2000 - French/English]
[Course]  Linux Security
[Presentation]  Linux and security [22 November 2002 - French]
[Presentation]  Some of Linux specificities for security [1 February 2002 - French]
[Presentation]  Linux Kernel Hardening - The useful and the futile in the grsecurity patch [28 January 2002 - French]
[Presentation]  Strengthening the Linux Kernel [6 February 2001 - French]
[Article]  Open-source software and security, the example of Linux [November 2000 - French]
[Tip]  Linux Kernel Modules (LKM): what benefits for administrators? [25 October 2000 - French/English]
[Presentation]  Linux and Security [13 April 2000 - French]
[Presentation]  Encrypted tunnels with Linux [18 June 1999 - French]
[Presentation]  Specific security characteristics of Linux [18 June 1999 - French]
[Presentation]  Linux for computer security [18 June 1999 - French]
[Presentation]  Linux for Computer Security [24 March 1999 - French]
> Copyright © 1999, Hervé Schauer Consultants, all rights reserved.

 

Last modified on 6 July 2009 at 15:03:40 CET - webmaster@hsc.fr
Information on this server - © 1989-2010 Hervé Schauer Consultants