Entry level cybersecurity with Linux
For event dates and additional information, leave a phone number or email address in the contact menu.
Part 1
Linux and Unix protection
Operating system environment and user environment. Hidden bootloader scripts.
Directory structure. File access rights. Types of users and groups. User rights. Change of user rights. Change of owner. chown. Inheritance of rights. Hidden files. File with hashed user passwords.
Input-output processes. Error console. Input and output commands. Telnet protocol. Communication between terminals. User behaviour tracking.
Command line language with the bash interpreter. A script for communicating between terminals.
Peripheral device management. Directory with peripheral device names.
File system structure from an operating system perspective. Create a partition and initialize the file system for the peripheral device. mke2fs. Mounting and unmounting a device. List of installed devices. df –H. df –version.
Operating system processes and user-owned processes. Inheritance of rights. Background processes. Hide a background process. Bringing a process from background to normal mode.
Overcoming user privilege restrictions with su and sudo. Change the user in the current shell session. Directory traversal.
Process priority. Change the priority of a process. Deferred Execution Schedule.
Module repositories. Installing a module in the operating system. Configure the module list.
Attaching and hiding a screen.
Monitoring user behaviour. Internal user monitoring commands in bash. Last and cat commands /home/user/.bash_history, sudo lastlog. Installing sysdig. sysdig –c spy_users. Additional packages psacct or acct
Configuring monitoring services. ssh logging, ftp logging.