Modules
Module | Domain | Description |
---|---|---|
API security | Web applications | |
Accounting | Audit and Compliance | |
Accounts | Identity and Access Management | |
Apache HTTP server | Web server security | The Apache HTTP server is one of the most well-known software components. It is the engine for many online resources. This module learns you how to set it up and improve its security defenses. |
Authentication | Identity and Access Management | |
Backup and Restore | Data and Storage | |
Basic principles | Security concepts | |
Configuration Management | DevOps Security | |
Containers | DevOps Security | |
Creating custom tools for security professionals | Software Development | Need to automate a task in your work or parse some data from another tool? This module helps you build your own security tool. |
Disk encryption | Data and Storage | |
Disk imaging | Digital Forensics | |
Django | Web applications | |
Enumeration of Systems and Services | Vulnerability Discovery | This module provides the tools to detect systems and services on the network or the selected target |
Extracting memory artifacts | Digital Forensics | |
File permissions | Data and Storage | |
File system forensics | Digital Forensics | |
File system security | Data and Storage | To achieve the right level of availability, integrity, and confidentiality, it needs to be protected by the underlying file system. |
Firewalls | Networking | There are many hardware-based firewall solutions on the market. This module covers the software-based firewalls, like iptables and nftables. |
IPSEC | Networking | |
Improving web security | Web applications | Almost all companies have a web presence formed by social media and a website. This module looks at securing the server and web applications. |
Kerberos | Identity and Access Management | |
Linux Server Security | Linux and System Security | A secure Linux server starts with having the basics in place. The fundamentals and system hardening steps will be covered. |
Linux and PCI-DSS | Audit and Compliance | |
Linux security modules | Linux and System Security | By applying security modules, the Linux kernel can be further hardened. This module shows the available options and how to use them. |
Logging | Digital Forensics | Correct logging is crucial on Linux to perform troubleshooting and be able to do digital forensics. Within this module this subject is extensively covered. |
Malware analysis | Malware | |
Malware detection | Malware | |
Network attacks | Networking | Learn the common attacks that might occur at the network level and how they work. |
OpenSSL | Cryptography | |
POP3 and IMAP | Mail and Messaging | |
Patch Management | System Management | This module covers software patch management, which is the process to discover, test, and apply software patches to systems |
Pluggable Authentication Modules (PAM) | Identity and Access Management | |
PostgreSQL security | Data and Storage | |
RADIUS | Identity and Access Management | |
Radare2 | Reverse Engineering | |
Rootkits | Malware | Rootkits are a special category within the malware family. Capable of remaining well-hidden and to provide its maintainer continuous access via a backdoor. |
SMTP | Mail and Messaging | |
Samba | File and Printer Sharing | |
Securing email communications | Mail and Messaging | Training module with focus on securing email to reduce spam and viruses, while increasing privacy and availability. |
Security Content Automation Protocol (SCAP) | Audit and Compliance | This module defines Security Content Automation Protocol (or SCAP) and how it applies to the Linux security field |
Security Enhanced Linux (SELinux) | Data and Storage | |
Setting up secure communications with OpenVPN | Networking | |
Software packaging | DevOps Security | |
Storage Protocols | Data and Storage | Protocols ensure compatibility between devices, which is crucial when dealing with data and its storage. Several storage protocols on Linux will be covered. Recently updated |
Storing passwords and secrets | Data and Storage | - |
System and Security Audits with Lynis | Audit and Compliance | Perform regular security audits on Linux systems with the Lynis auditing tool. |
Testing System Configurations | System Management | This module covers testing the configuration of systems, with a specific focus on software configurations |
Tuning kernel parameters for security | Linux and System Security | |
Using sudo | Identity and Access Management | |
systemd | System Management |