ERP Products Other Products Virtual Classroom

Search

paypal verified
paypal cartes de crédit

Red Hat Enterprise Security: Network Services


Red Hat Enterprise Security: Network Services

Now you can study at home by your self and
get certified.

The tests are based directly from the information from these books

RHS333 Red Hat Enterprise Security: Network Services

Course Description

Red Hat Enterprise Linux has gained considerable momentum as the operating system of choice for deploying network services such as web, ftp, email, and file sharing. RHS333 Red Hat Enterprise Security: Network Services is an intensive course that provides four days of instruction and labs on how to to use the latest technologies to secure your services.

What you will learn:

RHS333 goes beyond the essential security coverage offered in the RHCE curriculum and delves deeper into the security features, capabilities, and risks associated with the most commonly deployed services. Among the topics covered in this four-day, hands-on course are the following:

The Threat Model and Protection Methods
Internet threat model and the attacker's plan
System security and service availability
An overview of protection mechanisms
Basic Service Security
SELinux
Host-based access control
Firewalls using Netfilter and iptables
TCP wrappers
xinetd and service limits
Cryptography
Overview of cryptographic techniques
Management of SSL certificates
Using GnuPG
Logging and NTP
Time synchronization with NTP
Logging: syslog and its weaknesses
Protecting log servers
BIND and DNS Security
BIND vulnerabilities
DNS Security: attacks on DNS
Access control lists
Transaction signatures
Restricting zone transfers and recursive queries
DNS Topologies
Bogus servers and blackholes
Views
Monitoring and logging
Dynamic DNS security
Network Authentication: RPC, NIS, and Kerberos
Vulnerabilities
Network-managed users and account management
RPC and NIS security issues
Improving NIS security
Using Kerberos authentication
Debugging Kerberized Services
Kerberos Cross-Realm Trust
Kerberos Encryption
Network File System
Overview of NFS versions 2, 3, and 4
Security in NFS versions 2 and 3
Improvements in security in NFS4
Troubleshooting NFS4
Client-side mount options
OpenSSH
Vulnerabilities
Server configuration and the SSH protocols
Authentication and access control
Client-side security
Protecting private keys
Port-forwarding and X11-forwarding issues
Electronic Mail with Sendmail
Vulnerabilities
Server topologies
Email encryption
Access control and STARTTLS
Anti-spam mechanisms
Postfix
Vulnerabilities
Security and Postfix design
Configuring SASL/TLS
FTP
Vulnerabilities
The FTP protocol and FTP servers
Logging
Anonymous FTP
Access control
Apache security
Vulnerabilities
Access control
Authentication: files, passwords, Kerberos
Security implications of common configuration options
CGI security
Server side includes
suEXEC
Intrusion Detection and Recovery
Intrusion risks
Security policy
Detecting possible intrusions
Monitoring network traffic and open ports
Detecting modified files
Investigating and verifying detected intrusions
Recovering from, reporting, and documenting intrusions

                  Shipping

Shipping is free IMMEDIATE DOWNLOAD AFTER PAYMENT .Receive a direct download link in your email in 1 - 3 minutes.

[Do NOT forget to check the junk or Spam mails of your email box]

99.00 $



Enter promotionnal code:







Terms & Policy

Website hosting and design by Zedimage.com       admin