bluepoint.institute

bluepoint.institute

Linux® Network Security

| Revision 35 |
Bluepoint generates funds for its various Open Source advocacy and development projects through public course offerings. Our continuing education programs provide advanced and comprehensive training in Linux and Open Source.

Qualified applicants enjoy quality course content, certified and highly competent instructors, credits toward Bluepoint Certified PHP Developer™ (CPD) and Bluepoint Open Network Engineer™ (ONE) certifications, and subsidized training fees.

courseLINUX NETWORK SECURITY
duration18 hours
focusLinux system and network security
prerequisitesLinux Express® or equivalent experience
distributionsFedora and CentOS
credit towards certificationN/A
investmentPHP 14,950.00 NON-VAT
early birdPHP 14,202.50 NON-VAT


Linux® is an Open Source, full-featured, powerful and robust UNIX-like operating system based on the initial work of Linus Torvalds from the University of Helsinki in Finland. Since 1991, his work was extended and ported to many platforms by a worldwide community of software developers. Today it runs everything from embedded systems to nuclear submarines. Linux also powers Wall Street, the London Stock Exchange, the CERN supercollider, and NASA's supercomputers.


COURSE DESCRIPTION

Gain an understanding of how intruders and hackers think when attacking networks through real world examples and demonstrations. Learn how to minimize vulnerabilities and build strategies against attackers. Effectively evaluate network security and implement security best practices. All in 3 days!


COURSE OUTLINE

I. Introduction to Networking

II. Ethics and Hacking

III. Types of Attacks
Foot Printing
Scanning
Enumeration
System Hacking
Trojans and Backdoors
Sniffers
Denial of Service
Social Engineering
Session Hijacking
Web Application Vulnerabilities
Web Based Password Cracking Techniques
SQL Injection
Hacking Wireless Networks
Viruses
Buffer Overflows

IV. Protection and Prevention
Cryptography
Firewalls
Intrusion Detection Systems
Honey Pots
Honey Nets
Vulnerability Assessment
Penetration Testing



ATTRIBUTION

The registered trademark Linux® is used pursuant to a sublicense from Linux Mark Institute, the exclusive licensee of Linus Torvalds, owner of the mark on a world-wide basis. Fedora and CentOS are trademarks of Red Hat, Inc.