Corder Enterprises International (C.E.I.)
A Divider
1980 - 2016 Years of Service
Corder Enterprises International
A Divider
Go Green Gif The green data center
The Green Datacenter
A Divider Home
Training Offered by The Corder Company
The History of The Corder Company
The History of The Corder Company
e-Mail The Corder Company
e-Mail The Corder Company
VMware Training Courses
Site Map for C.E.I.
A Divider
AIX Training Courses
Solaris Training Courses
Linux Training Courses
Perl Training Courses
HTML Training Courses

E-Mail This Page
To a Friend.
Name Tag JPG
Now Hiring
Certified VMware Professional, VCP
VCP & VCIs

Fish GIF
1-Chronicles 4:10

Building World Class Teams
For you!®

Columbus

SPACER SPACER SPACER SPACER SPACER SPACER SPACER SPACER SPACER

    CU005 - UNIX System Security

    Length: 5 Days

    Description

    This course discusses UNIX security and how system managers and administrators can implement security measures on UNIX. The focus of the course is on the inherent security vulnerabilities commonly found on UNIX systems and how to correct them. Examples are presented which illustrate how to insure a high level of security confidence against unauthorized users from accessing the system. The common methods used to penetrate UNIX systems, gain unauthorized root access permission, become another user, plant trojan horses or spoofs, and other ways of circumventing the normal system protection are disclosed. Each attendee will receive detailed audit checklists and a diskette containing UNIX shell and C programs which will assist in performing security auditing and risk analysis.

    Course Objectives

    Upon completion of this seminar the attendee will be able to:
    1. state the built-in UNIX security control mechanisms;
    2. state the security vunerabilities inherient to UNIX systems;
    3. determine common methods used to gain unauthorized access to the system or data;
    4. identify the bugs contained in UNIX system and application programs and how they are exploited by unauthorized users;
    5. identify how trojan horses and spoofs are planted into the system and methods of detecting them;
    6. state the minimum recommended file and directory access permissions;
    7. perform a risk analysis and analyize the results; and
    8. execute audit programs which will assist in maintaining system security.

    Course Materials

    1. UNIX System Security Student Guide and course notes.

    Prerequisites

    1. CU001 - Fundamentals of UNIX
    2. CU002 - Bourne Shell Programming or CU003 - Korn Shell Programming
    3. UNIX System Administration
    4. A knowledge of shell and C programming is helpful.

    Course Content

    1. WHY UNIX SECURITY?
      1. UNIX Security Features
      2. UNIX Security Problems
      3. UNIX Security Levels
      4. The Trusted Computing Base
      5. The Orange Book
    2. USERS, PASSWORDS, GROUPS, AND THE SUPERUSER
      1. User Accounts
      2. Passwords
      3. Groups
      4. Substitute User
      5. User Security Checklist
    3. FILE SYSTEM SECURITY
      1. The UNIX File System
      2. Changing File Access Permissions
      3. Changing Owner and Group
      4. Set UID/Set GID
      5. Device Special Files
      6. Mountable File Systems
      7. File System Security Checklist
    4. PROGRAMMING SECURITY
      1. Input and Output Functions
      2. Writing Secure Programs
      3. Compiling and Installing SUID/SGID Programs
      4. Programming As root
      5. Programming Security Checklist
    5. NETWORK SECURITY
      1. UUCP Security
      2. TCP/IP Network Security
      3. Network Security Checklist
    6. COMMON SECURITY PROBLEMS ON UNIX
      1. System Problems
      2. System Accounts Without Passwords
      3. System Directories With Wrong Permissions
      4. System Files with Wrong Permissions
      5. Planting Trojan Horses
      6. Spoofing Methods
      7. Known Bugs, Trapdoors, and Viruses
      8. Intelligent Terminals
      9. Physical Access
      10. Security Problem Checklist
    7. PROTECTING YOUR SYSTEM
      1. Security Administration
      2. Security Compromises
      3. Restricted Environments
      4. Log Files
      5. Recommendations for Securing Your System
      6. Administrator Awareness
      7. Auditing
      8. What To Do If Your System Is Compromised
      9. Using the Trusted Computing Base for Auditing
      10. System Security Checklist
    8. COURSE CONCLUSION

    pdf icon gif
    Course
    Flyer
    pdf icon gif
    C.E.I.
    Flyer
    pdf icon gif
    Course
    Offering
    3mb
    AIX | HPUX | Linux | Solaris
    General UNIX | Web | Perl
    Copywrite 1980 - 2015
    VMware Certified Instructor