Bundle: CSX Linux System Administrator Pathway

Students get an understanding of Linux operating systems, commands, and capabilities.

Difficulty: Multilevel CSF Domain: All domains

$1,085.00

Price represents the non member rate.

Buy Now
or pay later by invoice
The Cybersecurity Nexus (CSX) Linux Application and Configuration (CLAC) course provides students an understanding of Linux operating systems, commands, and capabilities. Students will work with real Linux systems in real environments and will leverage commands, applications, and toolsets to complete tasks in a cybersecurity environment. Upon completion, students will be able to proactively leverage Linux to navigate, connect, and enhance business systems and networks– valuable traits in the cybersecurity field.

Continuing Professional Education (CPE) Credit Count: 40

Content

Lesson The Shell and Navigation

  • Learn detailed information about the shell
  • Identify key navigation commands
  • Learn how to implement basic commands

Lab/Instructional Shell and Navigation

Students are introduced to basic commands which they can leverage in the Linux command line interface (CLI).

Lesson Files and Studio

  • Learn about hard and symbolic links
  • Implement more advanced commands
  • Manipulate files and file contents
  • Redirect the Linux Standard Input / Output

Lab/Instructional Files and Standard Input/Output

Students are introduced to the standard input and output capability of the Linux terminal and learn additional commands which will help them leverage Linux effectively.

Lesson CLI Tricks, User Management and Services

  • Learn about bash history
  • Utilize TAB-Autocomplete functionality
  • Switch between consoles for multi-tasking
  • Environment variables
  • Add and remove users and groups

Lab/Instructional CLI Tricks

Students learn additional Linux terminal commands which better enable understanding of bash history and environment variables.

Lab/Instructional Services and Users

Students will learn the how user and group accounts work within the Linux environment and how they impact files and file permissions.

Lesson Package Management, Archives and Compiling

  • Explore the aptitude package management system
  • Use Aptitude to find, install, and remove packages
  • Conduct file management with archive utilities
  • Compile an executable

Lab/Instructional Package Management, Archives, and Compiling

Students learn how package managers function and how to compress and archive files using TAR. Additionally, they will learn how to compile source code.

Lab/Instructional Dos

Denial of Service attacks are utilized by attackers to impede service availability. In this lab students will experience the different components of a distributed denial of service attack.

Lab/Instructional Scanning Ports and Utilizing SSH

Servers and workstations usually provide services to other devices on the network. What services are running on what device and how do we utilize them? In this lab we’ll go through remote network service discovery as well as using an SSH service.

Lab/Instructional Windows and Linux File Permissions

File permissions ensure that specific users or groups of users have the resources they need to do their jobs while prohibiting unnecessary access to sensitive data. In this lab we will explore both Linux and Windows filesystems permission controls.

Lab/Instructional Windows and Linux OS Firewall

Firewalls prevent or allow the use of specific services on a workstation or server. Most modern operating systems provide built in functionality for firewalls. In this lab, we will look at both Windows and Linux OS level firewall configuration.

Lesson and Lab Network Scanning

Students will leverage network scanning tools to identify nodes and services on an internal network. The end goal is to create an up to date network map of their company's internal network for troubleshooting, analysis, and future reference.

Lesson and Lab Data Integrity

Students will learn the importance of data integrity through comparative analysis of hash algorithm output. Leveraging hashing tools, students will learn how to ensure that data is not compromised post-incident.

Lesson and Lab Restoring Data with Secure Copy

Students will learn the importance of data integrity through comparative analysis of hash algorithm output. Leveraging hashing tools, students will learn how to ensure that data is not compromised post-incident.

Lesson and Lab Threat Detection

Cyber security professionals are often given vague declarations of discontent from end-users experiencing technical difficulties. Understanding how to take minimal information and implement tools from their suite of capabilities to further understand the potential problems is key to proficiency. In this lab, students will implement typical network diagnostic tools to determine the type of issue an end user is having.

Lesson and Lab Asset, Change and Patch Management

Cyber security professionals are often given vague declarations of discontent from end-users experiencing technical difficulties. Understanding how to take minimal information and implement tools from their suite of capabilities to further understand the potential problems is key to proficiency. In this lab, students will implement typical network diagnostic tools to determine the type of issue an end user is having.

Lesson and Lab Cybersecurity Threat and Vulnerability Management

Students leverage OpenVAS to conduct vulnerability scans of a network's systems and identify the risk of exploitation.

Lesson and Lab Packet Construction and Kernel Hardening

Students will analyze a flood script built with Scapy, then configure their Linux kernel to detect flooding attacks.

Lesson and Lab Linux Baseline with Lynis

Lynis is a security auditing tool designed specifically for Linux systems. Lynis is an open-source product that runs on the host itself and is essential when it comes to obtaining knowledge on Linux baselining.

Lesson and Lab Script Construction and Execution

In the field of cybersecurity, learning how to combine a set of commands in a script is important no matter what operating system you use. The act of examining bash and batch scripts and their effects on systems is critical in not just offensive situations, but defensive scenarios as well.

Lesson and Lab Implementing Database Management

MySQL uses the Structured Query Language to provide a free and open source RDBMS. As an employee new to the database management team, it is your responsibility to understand the essentials of the Structured Query Language. You will be using MySQL to create a database, create a table, and insert valuable data in order to get a basic understanding of database management.

Lesson and Lab Generating and Analyzing Logs

As a network security expert, it is your responsibility to know how to use various tools within the Security Onion system. You will generate an attack within Kali Linux in order to trip alerts in Sguil and Kibana. You will need to be able to navigate through the Elastic Stack to investigate logs in order to be a blue team practitioner.