Drucken

LPIC-3 Enterprise Professional Security 303

Die LPIC-3-Zertifizierung ist der Höhepunkt des mehrstufigen professionellen Zertifizierungsprogramms des LPI. LPIC-3 wurde für den Linux-Profi auf Enterprise-Niveau entwickelt und stellt die höchste Stufe der professionellen, verteilungsneutralen Linux-Zertifizierung in der Branche dar. Drei verschiedene LPIC-3-Zertifizierungen mit unterschiedlichen Schwerpunkten werden angeboten. Wenn Sie eine der drei Prüfungen bestehen, erhalten Sie die LPIC-3-Zertifizierung für dieses Fachgebiet.

Das LPIC-3 303: Security Zertifizierung umfasst die Administration von Linux-Systemen unternehmensweit mit dem Schwerpunkt Sicherheit.

Kursinhalte 303:

325.1 X.509 Certificates and Public Key Infrastructures
Description: Candidates should understand X.509 certificates and public key infrastructures. They should know how to configure and use OpenSSL to implement certification authorities and issue SSL certificates for various purposes.

  • Understand X.509 certificates, X.509 certificate lifecycle, X.509 certificate fields and X.509v3 certificate extensions
  • Understand trust chains and public key infrastructures
  • Generate and manage public and private keys
  • Create, operate and secure a certification authority
  • Request, sign and manage server and client certificates
  • Revoke certificates and certification authorities

325.2 X.509 Certificates for Encryption, Signing and Authentication
Description: Candidates should know how to use X.509 certificates for both server and client authentication. Candidates should be able to implement user and server authentication for Apache HTTPD. The version of Apache HTTPD covered is 2.4 or higher.

  • Understand SSL, TLS and protocol versions
  • Understand common transport layer security threats, for example Man-in-the-Middle
  • Configure Apache HTTPD with mod_ssl to provide HTTPS service, including SNI and HSTS
  • Configure Apache HTTPD with mod_ssl to authenticate users using certificates
  • Configure Apache HTTPD with mod_ssl to provide OCSP stapling
  • Use OpenSSL for SSL/TLS client and server tests

325.3 Encrypted File Systems
Description: Candidates should be able to setup and configure encrypted file systems.

  • Understand block device and file system encryption
  • Use dm-crypt with LUKS to encrypt block devices
  • Use eCryptfs to encrypt file systems, including home directories and
  • PAM integration
  • Be aware of plain dm-crypt and EncFS

325.4 DNS and Cryptography
Description: Candidates should have experience and knowledge of cryptography in the context of DNS and its implementation using BIND. The version of BIND covered is 9.7 or higher.

  • Understanding of DNSSEC and DANE
  • Configure and troubleshoot BIND as an authoritative name server serving DNSSEC secured zones
  • Configure BIND as an recursive name server that performs DNSSEC validation on behalf of its clients
  • Key Signing Key, Zone Signing Key, Key Tag
  • Key generation, key storage, key management and key rollover
  • Maintenance and re-signing of zones
  • Use DANE to publish X.509 certificate information in DNS
  • Use TSIG for secure communication with BIND

326.1 Host Hardening
Description: Candidates should be able to secure computers running Linux against common threats. This includes kernel and software configuration.

  • Configure BIOS and boot loader (GRUB 2) security
  • Disable useless software and services
  • Use sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration
  • Exec-Shield and IP / ICMP configuration
  • Limit resource usage
  • Work with chroot environments
  • Drop unnecessary capabilities
  • Be aware of the security advantages of virtualization

326.2 Host Intrusion Detection
Description: Candidates should be familiar with the use and configuration of common host intrusion detection software. This includes updates and maintenance as well as automated host scans.

  • Use and configure the Linux Audit system
  • Use chkrootkit
  • Use and configure rkhunter, including updates
  • Use Linux Malware Detect
  • Automate host scans using cron
  • Configure and use AIDE, including rule management
  • Be aware of OpenSCAP

326.3 User Management and Authentication
Description: Candidates should be familiar with management and authentication of user accounts. This includes configuration and use of NSS, PAM, SSSD and Kerberos for both local and remote directories and authentication mechanisms as well as enforcing a password policy.

  • Understand and configure NSS
  • Understand and configure PAM
  • Enforce password complexity policies and periodic password changes
  • Lock accounts automatically after failed login attempts
  • Configure and use SSSD
  • Configure NSS and PAM for use with SSSD
  • Configure SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains
  • Kerberos and local domains
  • Obtain and manage Kerberos tickets

326.4 FreeIPA Installation and Samba Integration
Description: Candidates should be familiar with FreeIPA v4.x. This includes installation and maintenance of a server instance with a FreeIPA domain as well as integration of FreeIPA with Active Directory.

  • Understand FreeIPA, including its architecture and components
  • Understand system and configuration prerequisites for installing FreeIPA
  • Install and manage a FreeIPA server and domain
  • Understand and configure Active Directory replication and Kerberos cross-realm trusts
  • Be aware of sudo, autofs, SSH and SELinux integration in FreeIPA

327.1 Discretionary Access Control
Description: Candidates are required to understand Discretionary Access Control and know how to implement it using Access Control Lists. Additionally, candidates are required to understand and know how to use Extended Attributes.

  • Understand and manage file ownership and permissions, including SUID and SGID
  • Understand and manage access control lists
  • Understand and manage extended attributes and attribute classes

327.2 Mandatory Access Control
Description: Candidates should be familiar with Mandatory Access Control systems for Linux. Specifically, candidates should have a thorough knowledge of SELinux. Also, candidates should be aware of other Mandatory Access Control systems for Linux. This includes major features of these systems but not configuration and use.

  • Understand the concepts of TE, RBAC, MAC and DAC
  • Configure, manage and use SELinux
  • Be aware of AppArmor and Smack

327.3 Network File Systems
Description: Candidates should have experience and knowledge of security issues in use and configuration of NFSv4 clients and servers as well as CIFS client services. Earlier versions of NFS are not required knowledge.

  • Understand NFSv4 security issues and improvements
  • Configure NFSv4 server and clients
  • Understand and configure NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos)
  • Understand and use NFSv4 pseudo file system
  • Understand and use NFSv4 ACLs
  • Configure CIFS clients
  • Understand and use CIFS Unix Extensions
  • Understand and configure CIFS security modes (NTLM, Kerberos)
  • Understand and manage mapping and handling of CIFS ACLs and SIDs in a Linux system

328.1 Network Hardening
Description: Candidates should be able to secure networks against common threats. This includes verification of the effectiveness of security measures.

  • Configure FreeRADIUS to authenticate network nodes
  • Use nmap to scan networks and hosts, including different scan methods
  • Use Wireshark to analyze network traffic, including filters and statistics
  • Identify and deal with rogue router advertisements and DHCP messages

328.2 Network Intrusion Detection
Description: Candidates should be familiar with the use and configuration of network security scanning, network monitoring and network intrusion detection software. This includes updating and maintaining the security scanners.

  • Implement bandwidth usage monitoring
  • Configure and use Snort, including rule management
  • Configure and use OpenVAS, including NASL

328.3 Packet Filtering
Description: Candidates should be familiar with the use and configuration of packet filters. This includes netfilter, iptables and ip6tables as well as basic knowledge of nftables, nft and ebtables.

  • Understand common firewall architectures, including DMZ
  • Understand and use netfilter, iptables and ip6tables, including standard modules, tests and targets
  • Implement packet filtering for both IPv4 and IPv6
  • Implement connection tracking and network address translation
  • Define IP sets and use them in netfilter rules
  • Have basic knowledge of nftables and nft
  • Have basic knowledge of ebtables
  • Be aware of conntrackd

328.4 Virtual Private Networks
Description: Candidates should be familiar with the use of OpenVPN and IPsec.

  • Configure and operate OpenVPN server and clients for both bridged and routed VPN networks
  • Configure and operate IPsec server and clients for routed VPN networks using IPsec-Tools / racoon
    Awareness of L2TP

Empfohlene Vorkenntnisse

Dieser LPIC-3 Vorbereitungskurs richtet sich an fortgeschrittene Linux Techniker, die bereits eine LPIC-2 Zertifizierung besitzen und Unterstützung in ihrer Prüfungsvorbereitung für die LPIC-3 Zertifizierung benötigen.

Der weitere Weg zur LPIC-2 Zertifizierung

Nach Absolvierung unseres Kurses kann der Teilnehmer online unter http://www.lpi.org/linux-certifications/taking-exams einen Prüfungstermin bei einem Pearson VUE Test Center in seiner Nähe vereinbaren.

Hin und wieder gibt es auch die Möglichkeit, LPI-Prüfungen auf Papier abzulegen. Das geschieht meist auf Messen oder Kongressen, wie z.B. auf den Grazer Linux-Tagen oder den Linuxwochen in Wien. Diese Prüfungen können normalerweise zu einem erheblich günstigeren Preis abgelegt werden.

Die Prüfung bestehet aus 60 Fragen, die in 90 Minuten beantwortet werden müssen. Zum Bestehen der jeweiligen Prüfung sind 500 von 800 möglichen Punkten erforderlich.

Die Kosten pro Prüfung betragen ca. 150 EUR. In unserem Kurs s sind keine Prüfungsgebühren enthalten.

Details zu diesem Open Source Training

Kurstitel: LPIC-3 Enterprise Professional Security 303
Kurspreis: 2.725,00 € exkl. MwSt
pro Teilnehmer, Standardpreis ohne Rabatt

Kursdatum:    
Kurszeiten:

Open date - Open date
09:30 - 17:00
Alternative Termine stehen am Ende dieser Seite


Dieses Training findet in der typischen Classroom Variante und in der Live Variante übers Internet statt. Sie können selber entscheiden welche Variante besser für sie passt.


Kursort:


Das Classroom Training findet statt bei:

LinuxCampus
Brodtischgasse 4
2700 Wr. Neustadt (Österreich) Austria
Website des Veranstaltungsortes
LinuxCampus
Das Live Training findet statt bei:

Sie können vom jedem Ort teilnehmen von dem Sie möchten und es ist keine Anreise notwendig. Sie benötigen nur eine Webcam, einen Webbrowser und einen VNC-Client für den Zugriff auf ihr Teilnehmer LAB.

Details:

Der Kurs ist auf 10 Teilnehmer beschränkt
Die Unterrichtssprache ist Deutsch
Die Kursunterlagen werden im PDF Format bereitgestellt
Jeder Teilnehmer erhält ein Kurszertifikat
Kalt- und Heißgetränke und Snacks werden kostenlos bereitgestellt

Kennen Sie schon das LinuxCampus.net Rabatt & Bonus System?

Den Kurstermin Open date - Open date buchen

Schritt 1:  Auswahl der Kursvariante (Classroom oder Live)
Schritt 2:  Angabe der Teilnehmer Daten

EUR 2.725,00
Tooltip
Erforderlich Tooltip
Tooltip
Erforderlich Tooltip
Erforderlich Tooltip
Erforderlich Tooltip
Erforderlich Tooltip
Erforderlich Tooltip
Erforderlich Tooltip
Erforderlich Tooltip
Erforderlich
Tooltip
Tooltip
Tooltip
Hiermit bestätige ich das ich die AGB gelesen und akzeptiert habe
Erforderlich
1 Kursvariante
2 Anmeldedetails


Alternative Kursmöglichkeiten

Alternativer Kursort:
Dieses Thema kann auch als In-House Training oder Einzeltraining gebucht werden

Alternativer Termin:
Ab 2 Teilnehmern bieten wir Ihnen gerne einen auf Ihre Bedürfnisse abgestimmten Termin an

Weitere Termine zu diesem Kursthema

Datum Kurstitel Ort
ohne Datum LPIC-3 Enterprise Professional Security ... LinuxCampus
12.04.2021 LPIC-3 Enterprise Professional Security ... LinuxCampus

Diese Seite verwendet Cookies. Für eine uneingeschränkte Nutzung der Webseite werden Cookies benötigt. Sie stimmen der Verwendung von Cookies durch Anklicken von "OK" zu. Nähere Informationen finden Sie in unseren Datenschutzbestimmungen und unter dem folgenden Link "Weitere Informationen".