Audit and Compliance
In almost every work area one or more compliance standards may apply to your company. Examples include PCI-DSS for accepting credit card payments, HIPAA for healthcare institutions and service providers, or GDPR when storing information about citizens of the European Union.
Within this knowled...
Data and Storage
One of the most precious assets to an organization is data. Data should be properly stored, accessed, and transferred, to guarantee its availability, integrity, and confidentiality.
When development and operations are mixed correctly, the DevOps way of thinking can change how companies evolve. In this combination of skill sets, the importance of security becomes an important piece of the puzzle.
The knowledge domain of forensics requires in-depth knowledge of Linux security.
File and Printer Sharing
This knowledge domain includes the services needed to share resources like files and printers. Most businesses heavily depend on sharing data. For that reason, it is important to know about the related protocols and measures that can be taken.
Identity and Access Management
Linux systems typically need a combination of functional users (system accounts) and normal users to provide useful services. Within this knowledge domain, we look how this information is stored, used, and can be secured.
Dealing with incidents and intrusions by following modules from this Linux security expert domain.
Linux System Security
This knowledge domain combines all the training modules to secure systems running the Linux kernel.
To keep Linux systems secure of malware, this knowledge domain provides the insights.
This knowledge domain covers the wide range of networking modules. From securing network protocols up to filtering traffic.
This knowledge domain includes the security measures specifically for physical defenses, like direct access to the system.
Increase quality of security efforts by automation on the Linux platform. This knowledge domain explains the why, how, and what.
Vulnerability Assessment and Management
Most software is susceptible to errors, with some leading to serious security weaknesses. This domain deals with vulnerabilities, from detection up to management.
This knowledge domain helps with learning the steps that are part of pentesting and vulnerability management. We learn how to discover vulnerabilities and validate them.
Most software nowadays is in the form of a web-based application, leveraging the web browser to its fullest. From online software like a Content Management System, up to self-hosted software.