Auditing UNIX/LINUX
During this two day course, students will learn about the security issues that should be considered when conducting a UNIX/Linux audit. Students will understand how to identify and mitigate risks that affect UNIX/Linux operating systems. Hands-on exercises will be conducted to ensure that students have the opportunity to apply the concepts presented, as well as obtain hands-on experience with a UNIX/Linux systems. Multiple tools and techniques for conducting UNIX/Linux audits will be presented.
CPE:
14
Program Level:
Intermediate
Delivery Method:
Live
Cost :
$650 for this live 2 day course

Course Content
I. Basics
• UNIX variants
• Common UNIX Commands
• Banners
• Resources
• File system layout
• Hidden files
• Shells
• Environment variables
II. Users and groups
• Permissions
• umask/SUID/SGID
• /etc/passwd
• Users
• Common accounts
• Controlling root access
• /etc/group
• Common groups
III. Passwords
• /etc/shadow
• Password settings
• PAM
• Password cracking
IV. Patching
• Solutions
• Research
V. Ports and services
• Specific services
• PAM
• Starting services
• xinetd and inetd
• Startup scripts
• TCP Wrappers and firewalls
• Run levels
• Querying for services
• Cleartext protocols
• Cron
• Auditor Tips
VI. Auditing and logging
• Typical UNIX logs
• Syslog
• Integrity Checking
• Auditor Tips
VII. Tools for Auditors
• Intro to scripting
Laptop Required
Students are required to have a laptop in order to complete the hands-on exercises. The laptop should meet the following specifications for the student to get the most from the exercises:
• 16 GB RAM or higher
• 25 GB available hard drive space
• Windows 10 professional or later (Home or similar editions will not have some of the features needed.)
• Administrator privileges including the capability to install and run tools, as well as disable anti-virus
• VMWare Player should be installed
Target Audience
• Internal Auditors
• IT Specialist Auditors
• IT Auditors
• IT Audit Managers
• Information System Auditors
• Information Technology Auditors
• Information Security Officers
Prerequisites
Participants should be familiar with Internet technologies and commonly used Internet security controls. No other advance preparation is required.
What People Say About Us
We help you see the world differently, discover opportunities you may never have imagined and achieve results that bridge what is with what can be.

Bruce

Kristen

Glenn
