Bundle: CSX Linux System Administrator Pathway

Students get an understanding of Linux operating systems, commands, and capabilities.

Difficulty: Multilevel CSF Domain: All domains

$700.00

Price represents the non member rate.

Buy Now
or pay later by invoice
The Cybersecurity Nexus (CSX) Linux Application and Configuration (CLAC) course provides students an understanding of Linux operating systems, commands, and capabilities. Students will work with real Linux systems in real environments and will leverage commands, applications, and toolsets to complete tasks in a cybersecurity environment. Upon completion, students will be able to proactively leverage Linux to navigate, connect, and enhance business systems and networks– valuable traits in the cybersecurity field.

Continuing Professional Education (CPE) Credit Count: 44

Content

Lesson The Shell and Navigation

  • Learn detailed information about the shell
  • Identify key navigation commands
  • Learn how to implement basic commands

Lab/Instructional Shell and Navigation

Students are introduced to basic commands which they can leverage in the Linux command line interface (CLI).

Lesson Files and Studio

  • Learn about hard and symbolic links
  • Implement more advanced commands
  • Manipulate files and file contents
  • Redirect the Linux Standard Input / Output

Lab/Instructional Files and Standard Input/Output

Students are introduced to the standard input and output capability of the Linux terminal and learn additional commands which will help them leverage Linux effectively.

Lesson CLI Tricks, User Management and Services

  • Learn about bash history
  • Utilize TAB-Autocomplete functionality
  • Switch between consoles for multi-tasking
  • Environment variables
  • Add and remove users and groups

Lab/Instructional CLI Tricks

Students learn additional Linux terminal commands which better enable understanding of bash history and environment variables.

Lab/Instructional Services and Users

Students will learn the how user and group accounts work within the Linux environment and how they impact files and file permissions.

Lesson Package Management, Archives and Compiling

  • Explore the aptitude package management system
  • Use Aptitude to find, install, and remove packages
  • Conduct file management with archive utilities
  • Compile an executable

Lab/Instructional Package Management, Archives, and Compiling

Students learn how package managers function and how to compress and archive files using TAR. Additionally, they will learn how to compile source code.

Lab/Instructional Dos

Denial of Service attacks are utilized by attackers to impede service availability. In this lab students will experience the different components of a distributed denial of service attack.

Lab/Instructional Scanning Ports and Utilizing SSH

Servers and workstations usually provide services to other devices on the network. What services are running on what device and how do we utilize them? In this lab we’ll go through remote network service discovery as well as using an SSH service.

Lab/Instructional Windows and Linux File Permissions

File permissions ensure that specific users or groups of users have the resources they need to do their jobs while prohibiting unnecessary access to sensitive data. In this lab we will explore both Linux and Windows filesystems permission controls.

Lab/Instructional Windows and Linux OS Firewall

Firewalls prevent or allow the use of specific services on a workstation or server. Most modern operating systems provide built in functionality for firewalls. In this lab, we will look at both Windows and Linux OS level firewall configuration.

Lesson and Lab Network Scanning

Students will leverage network scanning tools to identify nodes and services on an internal network. The end goal is to create an up to date network map of their company's internal network for troubleshooting, analysis, and future reference.

Lesson and Lab Data Integrity

Students will learn the importance of data integrity through comparative analysis of hash algorithm output. Leveraging hashing tools, students will learn how to ensure that data is not compromised post-incident.

Lesson and Lab Restoring Data with Secure Copy

Students will learn the importance of data integrity through comparative analysis of hash algorithm output. Leveraging hashing tools, students will learn how to ensure that data is not compromised post-incident.

Lesson and Lab Threat Detection

Cyber security professionals are often given vague declarations of discontent from end-users experiencing technical difficulties. Understanding how to take minimal information and implement tools from their suite of capabilities to further understand the potential problems is key to proficiency. In this lab, students will implement typical network diagnostic tools to determine the type of issue an end user is having.

Lesson and Lab Asset, Change and Patch Management

Cyber security professionals are often given vague declarations of discontent from end-users experiencing technical difficulties. Understanding how to take minimal information and implement tools from their suite of capabilities to further understand the potential problems is key to proficiency. In this lab, students will implement typical network diagnostic tools to determine the type of issue an end user is having.