Linux Security Training
Our training program is currently under development. Follow our Twitter account (@LSELabs) for updates.
The program explained
What is LSE?
This self-paced and online training program teaches students to install, configure, and manage security on Linux systems. It covers both the basics and more in-depth subjects. As the program is continuously evolving, the student will learn new techniques and tools.
The individual courses in the LSE training program all focus on Linux security. They are lab-based, highly technical, and cover both defensive and offensive security. Typical students include system administrators, security professionals, forensic specialists, and pentesters.
Our objective: provide the best Linux security training on the marketJoining the program will grant access to additional functionality on our website:
- Access to more content (51 modules, 31 guides)
- Personal dashboard
- Completion status
- Extended search
Benefits
Normal technical trainings usually take between three and five days. The trainer has the goal to share as much from the curriculum as possible. This results in an overwhelming amount of information and limited room for questions or practical testing.
Why our program?
- Instead of one week of training: continuous learning
- Saving costs: No trainer that needs to travel and stay in a hotel
- Theory is replaced with practical tasks
Syllabus
- Audit and Compliance
- Accounting
- Linux and PCI-DSS
- Security Content Automation Protocol (SCAP)
- System and Security Audits with Lynis
- Cryptography
- OpenSSL
- Data and Storage
- Backup and Restore
- Disk encryption
- File permissions
- File system security
- PostgreSQL security
- Security Enhanced Linux (SELinux)
- Storage Protocols
- Storing passwords and secrets
- DevOps Security
- Configuration Management
- Containers
- Software packaging
- Digital Forensics
- Disk imaging
- Extracting memory artifacts
- File system forensics
- Logging
- File and Printer Sharing
- Samba
- Identity and Access Management
- Accounts
- Authentication
- Kerberos
- Pluggable Authentication Modules (PAM)
- RADIUS
- Using sudo
- Incident Response
- Linux and System Security
- Linux Server Security
- Linux security modules
- Tuning kernel parameters for security
- Mail and Messaging
- POP3 and IMAP
- SMTP
- Securing email communications
- Malware
- Malware analysis
- Malware detection
- Rootkits
- Memory Management
- Networking
- Firewalls
- IPSEC
- Network attacks
- Setting up secure communications with OpenVPN
- Physical Security
- Reverse Engineering
- Radare2
- Security Automation
- Security concepts
- Basic principles
- Software Development
- Creating custom tools for security professionals
- Software Exploitation
- System Management
- Patch Management
- Testing System Configurations
- systemd
- Vulnerability Discovery
- Enumeration of Systems and Services
- Vulnerability Management
- Web applications
- API security
- Django
- Improving web security
- Web server security
- Apache HTTP server