Knowledge Domains

Audit and Compliance

In almost every work area one or more compliance standards may apply to your company. Examples include PCI-DSS for accepting credit card payments, HIPAA for healthcare institutions and service providers, or GDPR when storing information about citizens of the European Union.

Within this knowled...

» View modules [2]

Data and Storage

One of the most precious assets to an organization is data. Data should be properly stored, accessed, and transferred, to guarantee its availability, integrity, and confidentiality.

» View modules [3]

DevOps Security

When development and operations are mixed correctly, the DevOps way of thinking can change how companies evolve. In this combination of skill sets, the importance of security becomes an important piece of the puzzle.

Digital Forensics

The knowledge domain of forensics requires in-depth knowledge of Linux security.

» View modules [1]

File and Printer Sharing

This knowledge domain includes the services needed to share resources like files and printers. Most businesses heavily depend on sharing data. For that reason, it is important to know about the related protocols and measures that can be taken.

Identity and Access Management

Linux systems typically need a combination of functional users (system accounts) and normal users to provide useful services. Within this knowledge domain, we look how this information is stored, used, and can be secured.

Incident Response

Dealing with incidents and intrusions by following modules from this Linux security expert domain.

Linux System Security

This knowledge domain combines all the training modules to secure systems running the Linux kernel.

» View modules [1]
Recently updated


To keep Linux systems secure of malware, this knowledge domain provides the insights.

» View modules [2]


This knowledge domain covers the wide range of networking modules. From securing network protocols up to filtering traffic.

» View modules [1]

Physical Security

This knowledge domain includes the security measures specifically for physical defenses, like direct access to the system.

Security Automation

Increase quality of security efforts by automation on the Linux platform. This knowledge domain explains the why, how, and what.

Software Exploitation

Software Exploitation

Recently updated

Vulnerability Assessment and Management

Most software is susceptible to errors, with some leading to serious security weaknesses. This domain deals with vulnerabilities, from detection up to management.

Vulnerability Discovery

This knowledge domain helps with learning the steps that are part of pentesting and vulnerability management. We learn how to discover vulnerabilities and validate them.

» View modules [1]
Recently updated

Web applications

Most software nowadays is in the form of a web-based application, leveraging the web browser to its fullest. From online software like a Content Management System, up to self-hosted software.

» View modules [1]