Unit 1: The thread model and
protection methods
- Internet threat model and the attacker's plan
- Systemsecurity and service availability
- An overview of protection mechanisms
Unit 2: Basic service
security
- SELinux
- Host-based access control
- Firewalls using Netfilter and iptables
- TCP Wrappers
- Xinetd and service limits
Unit 3:
Cryptography
- Overview of cryptographic techniques
- Management of SSL certificates
- Using GnuPG
Unit 4: Logging and NTP
- Time synchronization with NTP
- Logging: syslog and its weaknesses
Unit 5: BIND and DNS
security
- BIND vulnerabilities
- DNS security: attacks on DNS
- Access Control List
- Transaction signatures
- Restricting zone transfers and recursive queries
- DNS topologies
- Bogus servers and black holes
- Views
- Monitoring and logging
- Dynamic DNS security
Unit 6:
Network authentication: RPC, NIS, and Kerberos
- Vulnerabilities
- Network-managed users and account management
- RPC and NIS security issues
- Improving NIS security
- Using Kerberos authentication
- Debugging kerberized services
- Kerberos cross-realm trust
- Kerberos encryption
Unit 7: Network File
System
- Overview of NFS version 2, 3 and 4
- Security in NFS version 2 and 3
- Improvements in security in NFS4
- Trobleshooting NFS4
- Client-side mount options
Unit 8: Open SSH
- Vulnerabilities
- Server configuration and the SSH protocols
- Authentication and access control
- Client-side security
- Protecting private keys
- Port-forwarding and X11-forwarding issues
Unit 9: Electronic mail
with sendmail
- Vulnerabilities
- Server topologies
- Email encryption
- Access control and STARTTLS
- Anti-spam mechanisms
Unit 10: Postfix
- Vulnerabilities
- Security and Postfix design
- Configuring SASL/TLS
Unit 11: FTP
- Vulnerabilities
- The FTP protocol and FTP servers
- Logging
- Anonymous FTP
- Access control
Unit 12: Apache security
- Vulnerabilities
- Access Control
- Authentication: files, passwords, kerberos
- Security implications of common configuration options
- CGI security
- Server-sude ubckydes
- suEXEC
Unit 13: Intrusion
detection and recovery
- Intrusion risks
- Security policy
- Detecting possible intrusions
- Monitoring network traffic andopen ports
- Detecting modified files
- Investigating and verifying detected intrusions
- Recovering from, reporting, and documenting intrusions
|