API securityWeb applications
AccountingAudit and Compliance
AccountsIdentity and Access Management
Apache HTTP serverWeb server securityThe Apache HTTP server is one of the most well-known software components. It is the engine for many online resources. This module learns you how to set it up and improve its security defenses.
AuthenticationIdentity and Access Management
Backup and RestoreData and Storage
Basic principlesSecurity concepts
Configuration ManagementDevOps Security
ContainersDevOps Security
Creating custom tools for security professionalsSoftware DevelopmentNeed to automate a task in your work or parse some data from another tool? This module helps you build your own security tool.
Disk encryptionData and Storage
Disk imagingDigital Forensics
DjangoWeb applications
Enumeration of Systems and ServicesVulnerability DiscoveryThis module provides the tools to detect systems and services on the network or the selected target
Extracting memory artifactsDigital Forensics
File permissionsData and Storage
File system forensicsDigital Forensics
File system securityData and StorageTo achieve the right level of availability, integrity, and confidentiality, it needs to be protected by the underlying file system.
FirewallsNetworkingThere are many hardware-based firewall solutions on the market. This module covers the software-based firewalls, like iptables and nftables.
Improving web securityWeb applicationsAlmost all companies have a web presence formed by social media and a website. This module looks at securing the server and web applications.
KerberosIdentity and Access Management
Linux Server SecurityLinux and System SecurityA secure Linux server starts with having the basics in place. The fundamentals and system hardening steps will be covered.
Linux and PCI-DSSAudit and Compliance
Linux security modulesLinux and System SecurityBy applying security modules, the Linux kernel can be further hardened. This module shows the available options and how to use them.
LoggingDigital ForensicsCorrect logging is crucial on Linux to perform troubleshooting and be able to do digital forensics. Within this module this subject is extensively covered.
Malware analysisMalware
Malware detectionMalware
Network attacksNetworkingLearn the common attacks that might occur at the network level and how they work.
POP3 and IMAPMail and Messaging
Patch ManagementSystem ManagementThis module covers software patch management, which is the process to discover, test, and apply software patches to systems
Pluggable Authentication Modules (PAM)Identity and Access Management
PostgreSQL securityData and Storage
RADIUSIdentity and Access Management
Radare2Reverse Engineering
RootkitsMalwareRootkits are a special category within the malware family. Capable of remaining well-hidden and to provide its maintainer continuous access via a backdoor.
SMTPMail and Messaging
SambaFile and Printer Sharing
Securing email communicationsMail and MessagingTraining module with focus on securing email to reduce spam and viruses, while increasing privacy and availability.
Security Content Automation Protocol (SCAP)Audit and ComplianceThis module defines Security Content Automation Protocol (or SCAP) and how it applies to the Linux security field
Security Enhanced Linux (SELinux)Data and Storage
Setting up secure communications with OpenVPNNetworking
Software packagingDevOps Security
Storage ProtocolsData and StorageProtocols ensure compatibility between devices, which is crucial when dealing with data and its storage. Several storage protocols on Linux will be covered.
Recently updated
Storing passwords and secretsData and Storage-
System and Security Audits with LynisAudit and CompliancePerform regular security audits on Linux systems with the Lynis auditing tool.
Testing System ConfigurationsSystem ManagementThis module covers testing the configuration of systems, with a specific focus on software configurations
Tuning kernel parameters for securityLinux and System Security
Using sudoIdentity and Access Management
systemdSystem Management