Modules
| Module | Domain | Description |
|---|---|---|
| API security | Web applications | |
| Accounting | Audit and Compliance | |
| Accounts | Identity and Access Management | |
| Apache HTTP server | Web server security | The Apache HTTP server is one of the most well-known software components. It is the engine for many online resources. This module learns you how to set it up and improve its security defenses. |
| Authentication | Identity and Access Management | |
| Backup and Restore | Data and Storage | |
| Basic principles | Security concepts | |
| Configuration Management | DevOps Security | |
| Containers | DevOps Security | |
| Creating custom tools for security professionals | Software Development | Need to automate a task in your work or parse some data from another tool? This module helps you build your own security tool. |
| Disk encryption | Data and Storage | |
| Disk imaging | Digital Forensics | |
| Django | Web applications | |
| Enumeration of Systems and Services | Vulnerability Discovery | This module provides the tools to detect systems and services on the network or the selected target |
| Extracting memory artifacts | Digital Forensics | |
| File permissions | Data and Storage | |
| File system forensics | Digital Forensics | |
| File system security | Data and Storage | To achieve the right level of availability, integrity, and confidentiality, it needs to be protected by the underlying file system. |
| Firewalls | Networking | There are many hardware-based firewall solutions on the market. This module covers the software-based firewalls, like iptables and nftables. |
| IPSEC | Networking | |
| Improving web security | Web applications | Almost all companies have a web presence formed by social media and a website. This module looks at securing the server and web applications. |
| Kerberos | Identity and Access Management | |
| Linux Server Security | Linux and System Security | A secure Linux server starts with having the basics in place. The fundamentals and system hardening steps will be covered. |
| Linux and PCI-DSS | Audit and Compliance | |
| Linux security modules | Linux and System Security | By applying security modules, the Linux kernel can be further hardened. This module shows the available options and how to use them. |
| Logging | Digital Forensics | Correct logging is crucial on Linux to perform troubleshooting and be able to do digital forensics. Within this module this subject is extensively covered. |
| Malware analysis | Malware | |
| Malware detection | Malware | |
| Network attacks | Networking | Learn the common attacks that might occur at the network level and how they work. |
| OpenSSL | Cryptography | |
| POP3 and IMAP | Mail and Messaging | |
| Patch Management | System Management | This module covers software patch management, which is the process to discover, test, and apply software patches to systems |
| Pluggable Authentication Modules (PAM) | Identity and Access Management | |
| PostgreSQL security | Data and Storage | |
| RADIUS | Identity and Access Management | |
| Radare2 | Reverse Engineering | |
| Rootkits | Malware | Rootkits are a special category within the malware family. Capable of remaining well-hidden and to provide its maintainer continuous access via a backdoor. |
| SMTP | Mail and Messaging | |
| Samba | File and Printer Sharing | |
| Securing email communications | Mail and Messaging | Training module with focus on securing email to reduce spam and viruses, while increasing privacy and availability. |
| Security Content Automation Protocol (SCAP) | Audit and Compliance | This module defines Security Content Automation Protocol (or SCAP) and how it applies to the Linux security field |
| Security Enhanced Linux (SELinux) | Data and Storage | |
| Setting up secure communications with OpenVPN | Networking | |
| Software packaging | DevOps Security | |
| Storage Protocols | Data and Storage | Protocols ensure compatibility between devices, which is crucial when dealing with data and its storage. Several storage protocols on Linux will be covered. Recently updated |
| Storing passwords and secrets | Data and Storage | - |
| System and Security Audits with Lynis | Audit and Compliance | Perform regular security audits on Linux systems with the Lynis auditing tool. |
| Testing System Configurations | System Management | This module covers testing the configuration of systems, with a specific focus on software configurations |
| Tuning kernel parameters for security | Linux and System Security | |
| Using sudo | Identity and Access Management | |
| systemd | System Management |