Hardening of Linux systems and services

Hardening of Linux systems and services

The course provides advanced hardening skills for protecting Linux systems, with a focus on service, network and data security. The session will cover security strategies for system access, permission management, firewalls and the use of containers for application isolation. Tools for security monitoring and auditing will be presented, along with encryption techniques for protecting sensitive data.

Topics

Access management and authentication; File security and permissions management; Network security, firewalls and VPNs; Hardening of critical services; Hardening of services through containerisation; Security monitoring and logging; Auditing and security compliance (e.g. Lynis, CIS Benchmark and OpenSCAP); Encryption and protection of data at rest (e.g. LUKS) and in transit.

Target

Prerequisites
Basic knowledge of Linux system administration, user management, permissions, and the main commands for configuring networks and services. A basic understanding of cybersecurity and virtualisation is useful.

Learning outcomes
By the end of the course, participants will be able to implement advanced hardening techniques on Linux systems, strengthen the security of services and networks, protect sensitive data using encryption, monitor suspicious activity, verify compliance using auditing tools, and apply security strategies in containerised and virtualised environments.

Course structure

Module 1 - BASIC HARDENING
4 hours
  • Access management and advanced authentication
  • File security and permission management.
Module 2 - SERVICE HARDENING AND NETWORK PROTECTION
4 hours
  • Advanced firewall configuration (iptables,
    nftables) and VPN
    Security of critical services: SSH, web server,
    database
Module 3 - MONITORING, AUDITING AND COMPLIANCE
4 hours
  • Security log analysis and management (syslog, journald)
  • Auditing and compliance tools (Lynis, CIS Benchmark, OpenSCAP)
Module 1 - HARDENING OF LINUX SYSTEMS
3 hours
  • Secure access configuration
  • Security principles for file permissions
Module 2 - SERVICE AND NETWORK PROTECTION
3 hours
  • Firewalls, VPN and network segmentation
  • Security of critical services and protection of containerised environments
Module 3 - MONITORING, AUDITING AND COMPLIANCE
3 hours
  • Logging techniques and security event monitoring
  • Tools for verifying compliance with key standards.

Hardening of Linux systems and services

Index

Request more information

Fill in all sections of the form and click CONFIRM.

You may also be interested in…