Securing UNIX systems training course description This course teaches you everything you need to know to build a safe Linux environment. The first section handles cryptography and authentication with certificates, openssl, mod_ssl, DNSSEC and filesystem encryption. Then Host security and hardening is covered with intrusion detection, and also user management and authentication. Filesystem Access control is then covered. Finally network security is covered with network hardening, packet filtering and VPNs. What will you learn Secure UNIX accounts. Secure UNIX file systems. Secure UNIX access through the network. Securing UNIX systems course details Who will benefit: Linux technical staff needing to secure their systems. Prerequisites: Linux system administration (LPIC-1) Duration 5 days Securing UNIX systems course contents Cryptography Certificates and Public Key Infrastructures X.509 certificates, lifecycle, fields and certificate extensions. Trust chains and PKI. openssl. Public and private keys. Certification authority. Manage server and client certificates. Revoke certificates and CAs. Encryption, signing and authentication SSL, TLS, protocol versions. Transport layer security threats, e.g. MITM. Apache HTTPD with mod_ssl for HTTPS service, including SNI and HSTS. HTTPD with mod_ssl to authenticate users using certificates. HTTPD with mod_ssl to provide OCSP stapling. Use OpenSSL for SSL/TLS client and server tests. Encrypted File Systems Block device and file system encryption. dm-crypt with LUKS to encrypt block devices. eCryptfs to encrypt file systems, including home directories and, PAM integration, plain dm-crypt and EncFS. DNS and cryptography DNSSEC and DANE. BIND as an authoritative name server serving DNSSEC secured zones. BIND as an recursive name server that performs DNSSEC validation, KSK, ZSK, Key Tag, Key generation, key storage, key management and key rollover, Maintenance and resigning of zones, Use DANE. TSIG. Host Security Host Hardening BIOS and boot loader (GRUB 2) security. Disable useless software and services, sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration, Exec-Shield and IP / ICMP configuration, Limit resource usage. Work with chroot environments, Security advantages of virtualization. Host Intrusion Detection The Linux Audit system, chkrootkit, rkhunter, including updates, Linux Malware Detect, Automate host scans using cron, AIDE, including rule management, OpenSCAP. User Management and Authentication NSS and PAM, Enforce password policies. Lock accounts automatically after failed login attempts, SSSD, Configure NSS and PAM for use with SSSD, SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains, Kerberos and local domains, Kerberos tickets. FreeIPA Installation and Samba Integration FreeIPA, architecture and components. Install and manage a FreeIPA server and domain, Active Directory replication and Kerberos cross-realm trusts, sudo, autofs, SSH and SELinux integration in FreeIPA. Access Control Discretionary Access Control File ownership and permissions, SUID, SGID. Access control lists, extended attributes and attribute classes. Mandatory Access Control TE, RBAC, MAC, DAC. SELinux, AppArmor and Smack. etwork File Systems NFSv4 security issues and improvements, NFSv4 server and clients, NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos), NFSv4 pseudo file system, NFSv4 ACLs. CIFS clients, CIFS Unix Extensions, CIFS security modes (NTLM, Kerberos), mapping and handling of CIFS ACLs and SIDs in a Linux system. Network Security Network Hardening FreeRADIUS, nmap, scan methods. Wireshark, filters and statistics. Rogue router advertisements and DHCP messages. Network Intrusion Detection ntop, Cacti, bandwidth usage monitoring, Snort, rule management, OpenVAS, NASL. Packet Filtering Firewall architectures, DMZ, netfilter, iptables and ip6tables, standard modules, tests and targets. IPv4 and IPv6 packet filtering. Connection tracking, NAT. IP sets and netfilter rules, nftables and nft. ebtables. conntrackd Virtual Private Networks OpenVPN server and clients for both bridged and routed VPN networks. IPsec server and clients for routed VPN networks using IPsec-Tools / racoon. L2TP.
Duration 2 Days 12 CPD hours This course is intended for This class is intended for PMP?s looking to earn PDU's, or for Project Managers looking to learn more about Project Scope and Schedule Management techniques. This course provides participants with tools and techniques to help them determine and deliver products, services, and results that meet requirements, expectations, and deadlines. NOTE: This course will earn you 14 PDUs. 1 - PROJECT SCOPE AND TIME MANAGEMENT OVERVIEW Project Scope Management Overview Project Scope Mgt. Processes and Key Outputs Project Time Management Overview Project Time Mgt. Processes and Key Outputs Case Study Selection Requirements, Scope, and Negotiations 2 - PLAN SCOPE AND SCHEDULE MANAGEMENT Plan Scope and Schedule Mgt. Overview The Scope Management Plan The Requirements Management Plan The Schedule Management Plan 3 - COLLECT REQUIREMENTS Collect Requirements Overview Types of Requirements Effective Product/Solution Requirements Other Stakeholders and Requirements Collect Requirements Techniques Voice of the Customer Requirements Traceability Matrix 4 - DEFINE SCOPE Define Scope Overview Project Scope Statement Sections Create a Project Scope Statement 5 - CREATE WBS Create WBS Overview WBS by Deliverable WBS by Phase When to Subdivide a Work Package Further Effective WBSs General Process for Creating the WBS Create a WBS 6 - DEFINE ACTIVITIES Define Activities Overview Practical Considerations for Defining Activities Activities and Steps Milestones Create Activities and Milestones 7 - SEQUENCE ACTIVITIES Develop Schedule Overview Critical Path Resource Optimization ? Resource Leveling Resource Optimization ? Resource Smoothing Resolve Overallocations Critical Chain Schedule Compression Techniques 8 - ESTIMATE ACTIVITY RESOURCES Estimate Activity Resources Overview Resource Breakdown Structure Estimate Activity Resources Assign Resources to Activities 9 - ESTIMATE ACTIVITY DURATIONS Estimate Activity Durations Overview Expert Judgment Ratio Estimating Analogous Estimating Parametric Estimating Forecasting Three Point Estimating and PERT Estimating Reserves Estimate Activity Durations 10 - DEVELOP SCHEDULE Develop Schedule Overview Critical Path Resource Optimization ? Resource Leveling Resource Optimization ? Resource Smoothing Resolve Overallocations Critical Chain Schedule Compression Techniques 11 - VALIDATE SCOPE Validate Scope Overview Verify Scope Best Practices Create a Scope Validation Form 12 - CONTROL SCOPE AND SCHEDULE Control Scope Overview Control Schedule Overview Control Scope Best Practices Change Control Stakeholders Determine Change Control Stakeholders Change Control Process Change Request Form
This concise and comprehensive course takes you through the basic and advanced topics of Ansible, explaining all the concepts clearly and thoroughly. You will not only master the concepts but also learn how to use Ansible with cloud services and containers.
Learn how to stop being a people pleaser and take care of yourself in our online event on 5th July 2024 at 9.30am to 12.30 BST. Understanding why Pleasing & Appeasing Others can be so addictive. Join us for an insightful online event where we delve into the reasons behind our tendency to constantly seek approval and validation from others. From understanding the roots of this behaviour to learning how to break free from these patterns, this session will offer valuable insights and strategies for personal growth and empowerment.
Overview This comprehensive course on Master JavaScript with Data Visualization will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Master JavaScript with Data Visualization comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Master JavaScript with Data Visualization. It is available to all students, of all academic backgrounds. Requirements Our Master JavaScript with Data Visualization is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 11 sections • 76 lectures • 06:21:00 total length •Introduction to Getting Started: 00:02:00 •Course Curriculum: 00:05:00 •How to Get Pre-Requisites: 00:02:00 •Getting Started on Windows, Linux or Mac: 00:01:00 •How to ask a Great Questions: 00:02:00 •FAQ's: 00:01:00 •What is JavaScript: 00:09:00 •Choosing Code Editor: 00:03:00 •Installing Code Editor (Sublime Text): 00:04:00 •Installing Code Editor(Visual Studio Code): 00:07:00 •Hello World Program: 00:14:00 •Getting Output: 00:11:00 •Summary: 00:02:00 •Introduction: 00:02:00 •Internal JavaScript: 00:13:00 •External JavaScript: 00:09:00 •Inline JavaScript: 00:04:00 •Async and defer: 00:06:00 •Variables: 00:13:00 •Data Types: 00:10:00 •Numbers: 00:06:00 •Boolean: 00:04:00 •Arrays(): 00:12:00 •Objects: 00:06:00 •Comments: 00:05:00 •Summary: 00:01:00 •Introduction: 00:02:00 •Strings: 00:06:00 •String Formatting: 00:05:00 •String Methods: 00:12:00 •Summary: 00:02:00 •Introduction: 00:02:00 •Arithmetic operators: 00:07:00 •Assignment operators: 00:03:00 •Comparison operators: 00:06:00 •Logical operators: 00:08:00 •Summary: 00:02:00 •Introduction: 00:02:00 •If statement: 00:04:00 •If-else statement: 00:05:00 •If-else-if statement: 00:04:00 •Switch-case statement: 00:09:00 •Summary: 00:01:00 •Introduction: 00:02:00 •While loop: 00:09:00 •Do-while loop: 00:03:00 •For loop: 00:08:00 •Break: 00:02:00 •Continue: 00:03:00 •Coding Exercise: 00:02:00 •Solution for Coding Exercise: 00:02:00 •Summary: 00:02:00 •Introduction: 00:02:00 •Creating a Function: 00:07:00 •Function Call(): 00:07:00 •Function with parameters: 00:05:00 •Function Bind(): 00:06:00 •Summary: 00:01:00 •Introduction: 00:01:00 •How to Use Google chart script: 00:04:00 •Line Graph chart: 00:14:00 •Scatter plots chart: 00:02:00 •Bar chart: 00:04:00 •Pie chart: 00:02:00 •3D Pie chart: 00:02:00 •Summary: 00:01:00 •Introduction: 00:01:00 •Try-catch: 00:05:00 •Try-catch-finally: 00:17:00 •Summary: 00:01:00 •Introduction: 00:01:00 •On Submit Validation: 00:09:00 •Input Numeric Validation: 00:12:00 •Login Form Validation: 00:05:00 •Password Strength Check Validation: 00:04:00 •Summary: 00:01:00
We offer the most advanced “Certified Six Sigma Green Belt Course” as per the curriculum outline of The ASQ Body of Knowledge and accredited by top international Lean & Six Sigma accreditation bodies. Six Sigma Green Belt Deliverables: 22+ hours of Instructor-led interactive virtual classroom session on the weekend Access to 45+ hours of Module based Six Sigma lectures via LMS 100+ Toolkits and Project Templates for Analysis and Implementation Soft copy of Lean Six Sigma Green Belt Body of Knowledge Live Data-oriented project, with Scenario and Analysis Methodology 20+ Dummy Projects and Case studies for Lean Six Sigma Application Support via subject expert through telephonic discussion on the weekend Sample Questions and Examination Guide for Certification Preparation Pre and Post assignments for process groups and knowledge areas Project implementation support and Data visualization using MINITAB PRO CLSSGB certification examination anytime within the 90 days course duration Certification Validation Tool for third-party credentials validation PARTICULARS Duration (Hours) 1. Define Phase 22 2. Measure Phase 14 3. Analyse Phase 20 4. Improve Phase 7 5. Control Phase 7 Total Duration 70 (Hours) Introduction Become an expert in six sigma methodology by getting hands-on knowledge on DMAIC, Project Charter, Process Capability, FMEA, Sigma calculation, Test of Hypothesis, Control Charts, VSM, JIT using real case scenarios and real-life examples. Lean and DMAIC methodologies using live projects. The Six Sigma Certification is accredited by The Council for Six Sigma Certification. The certification also acknowledges the BOK outline of The American Society for Quality, USA. The course features world-class content with live projects and MINITAB PRO driven data analysis training with end to end support in project implementation by Master Black Belt Experts and Trainers. What is Six Sigma Certification? A person with Six Sigma certification has problem-solving abilities. Someone may gain Green Belt, Black Belt or Master Black Belt certification. The higher certification one attains, the more is the ability to solve complex organizational problems. Six Sigma certification is a process of individual’s knowledge validation using a classification system, generally referred to as "Belts" (Green Belt, Black Belt, Master Black Belt) This verification test individual commands over six sigma methodology and tools. The belt classification shows the position these certified individuals would occupy in an organizational structure and job roles. Six Sigma Green Belt training is especially for the future project leaders of Lean Six Sigma projects. We deliberately mix non-profit with profit participants. There will then be fun, useful discussions and knowledge exchanges during the training sessions. In addition, there are also many self-employed people who follow the LSS Green Belt training to increase their expertise as in a trimmer. What do you do to get the Six Sigma Green Belt certificate? Our Six Sigma Green Belt training consists of a number of components: Training: in an intensive training program you learn the background of Lean and Six Sigma and we put what we have learned into practice with different simulations. Extra: With our Body of Knowledge and whitepapers you place what you have learned in a theoretical framework. The program also contains various homework assignments, in which we focus, among other things, on the use of MINITAB PRO. Follow-up: During the training, you will receive an access code to an e-learning module. You can pass the substance again in an interactive way. Exam: On the last training day you will make the CLSSGB Green Belt exam. If you succeed, you will immediately receive the official Certified Lean Six Sigma Green Belt certification. Global Recognition of Your Certification: Agenda Overview of Six Sigma and the organizationSix Sigma and organizational goalsValue of six sigmaOrganizational goals and six sigma projectsOrganizational drivers and metricsLean principles in the organizationLean conceptsValue-streaming mappingDesign for six sigma (DFSS) methodologiesRoadmaps for DFSSBasic failure mode and effects analysis (FMEA)Design FMEA and process FMEA Define PhaseProject identificationProject SelectionProcess elementsBenchmarkingProcess inputs and outputsOwners and stakeholders Voice of the customer (VOC) Customer identificationCustomer dataCustomer requirements Project Management Basics Project charterProject scopeProject metricsProject planning toolsProject documentationProject risk analysisProject closureManagement and planning toolsBusiness results for projectsProcess performance CommunicationTeam dynamics and performanceTeam stages and dynamicsTeam roles and responsibilitiesTeam toolsTeam Communication Measure PhaseProcess analysis and documentationProbability and statisticsBasic probability conceptsCentral limit theorem, Statistical distributions, Collecting and summarizing dataTypes of data and measurement scalesSampling and data collection methodsDescriptive statisticsGraphical methodsMeasure Phase (contd E. Measurement system analysis (MSA) F. Process and performance capabilityProcess performance vs. process specificationsProcess capability studiesProcess capability (Cp, Cpk) and process performance (Pp, Ppk) indicesShort-term vs. long-term capability and sigma shift Analyze PhaseExploratory data analysisMulti-vari studiesCorrelation and linear regression B, Hypothesis testingBasics Tests for means, variances, and proportionsIntroduction to MINITAB Data analysis Improve Phase of Six SigmaDesign of experiments (DOE)Basic terms, DOE graphs, and plotsThe root cause analysisLean Tools 1. Waste elimination 2. Cycle-time reduction 3. Kaizen and kaizen blitz V1. Control PhaseStatistical process control (SPC)SPC BasicsRational subgroupingControl chartsControl planLean tools for process controlTotal productive maintenance (TPM)Visual factory Project Implementation & SupportMINITAB Practice and guidance for projectProject implementation supportTemplates and Toolkits application for Project workSupport on Data Project, Implementation and project completion BenefitsFrom the course Learn the principles and philosophy behind the Six Sigma technique Learn to apply statistical methods to improve business processes Design and implement Six Sigma projects in a practical scenario Learn the DMAIC process and various tools used in Six Sigma methodology Knowledge of Six Sigma Green Belt Professional enables you to understand real-world business problems, increase an organization's revenue by streamlining the process, and become an asset to an organization According to Villanova University, employers such as United Health Group, Honeywell, GE and Volkswagen have been actively seeking professionals with Six Sigma to fill a variety of positions The Training enhances your skills and enables you to perform roles like Quality Manager, Quality Analyst, Finance Manager, Supervisor, Quality Control, etc. According to Indeed.com, the national average salary for a Six Sigma Green Belt is $72,000 per year in the United States. From the workshop Instructor LED training by Six Sigma Black Belt and Master Belt experts to make candidate learn the real scenario of six sigma tools and methodology Learn the principles and philosophy behind the Six Sigma method Dummy project by instructors to make candidate get a hands-on six sigma projects Downloadable Six Sigma PPT & Six Sigma PDF Industry Based case studies High-Quality training from an experienced trainer The Program extensively uses Minitab, specialized statistical software. It provides you with a thorough knowledge of Six Sigma philosophies and principles (including supporting systems and tools). Know about six sigma certification cost and six sigma green belt certification cost. Who should attend? The Six Sigma program is designed for professionals and students who want to develop the ability to lead process improvement initiatives. Six Sigma tools and process is widely used in all business processes. Six Sigma is applicable in all industry and in all functional areas. An indicative list of participants in our Green Belt program could include: Financial/business analyst Commodity manager Project manager Quality manager Production manager Production Engineer Business development manager Manufacturing process engineer Continuous improvement director Business managers or consultants Project manager/Program Manager Director or VP of operations CEO, CFO, CTO Certification On successful completion of the course and course requisites, the candidate will receive Internationally recognized Six Sigma Green Belt Certification. This course offers Six Sigma Certification Validation Tool for Employers Your Six Sigma Certification Validation Tool can be used by employers, clients and other stakeholders to validate the authenticity of your Six Sigma Certifications you have received. Using the programming code located on your certified LSSGB certification, one can see all your training and certification details online.
Description: Web applications are increasingly more sophisticated and as such, they are critical to almost all major online businesses. This Certified Secure Web Application Engineer (CSWAE) - Complete Video Course covers everything you need to know about becoming a Certified Secure Web Application Engineer. In this course, you will learn about web application security, secure SDLC, OWASP TOP 10, risk management, threat modeling, authentication and authorization attacks, session management, security architecture, input validation and data sanitization, AJAX security, insecurity code discovery and mitigation, application mapping, cryptography, and testing methodologies. This Certified Secure Web Application Engineer (CSWAE) - Complete Video Course will provide you with a thorough and broad understanding of secure application concepts, principles, and standards. You will be able to design, develop and test web applications that will provide reliable web services that meet functional business requirements and satisfy compliance and assurance needs. Assessment: At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? Certified Secure Web Application Engineer (CSWAE) - Complete Video Course is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our Certified Secure Web Application Engineer (CSWAE) - Complete Video Course is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Web Application Security Web Application Security FREE 01:20:00 Secure SDLC Secure SDLC 00:26:00 OWASP TOP 10 OWASP TOP 10 00:28:00 Risk Management Risk Management 00:35:00 Threat Modeling Threat Modeling 00:18:00 Authentication and Authorization Attacks Authentication and Authorization Attacks 00:24:00 Session Management Session Management 00:35:00 Security Architecture Security Architecture 00:29:00 Input Validation and Data Sanitization Input Validation and Data Sanitization 00:24:00 AJAX Security AJAX Security 00:05:00 Insecurity Code Discovery and Mitigation Insecurity Code Discovery and Mitigation 00:39:00 Application Mapping Application Mapping 00:07:00 Cryptography Cryptography 00:52:00 Testing Methodologies Testing Methodologies 00:31:00 Mock Exam Mock Exam- Certified Secure Web Application Engineer (CSWAE) - Complete Video Course 00:20:00 Final Exam Final Exam- Certified Secure Web Application Engineer (CSWAE) - Complete Video Course 00:20:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00
This one-day course focuses on issues such as writing formulas and accessing help while writing them, and taking formulas to the next level by nesting one inside another for a powerful formula result. It also looks at ways of analysing data with reports, summarised by varying criteria. A range of time-saving tips and tricks are shared. This course will help participants: Calculate with absolute reference Group worksheets Link to tables Use the function library effectively Get to grips with the logical IF function Use conditional formatting Create pivot table reports Use data validation Master the VLOOKUP function 1 Calculating with absolute reference The difference between a relative and absolute formula Changing a relative formula to an absolute Using $ signs to lock cells when copying formulas 2 Grouping worksheets Grouping sheets together Inputting data into multiple sheets Writing a 3D formula to sum tables across sheets 3 Linking to tables Linking to a source table Using paste link to link a table to another file Using edit links to manage linked tables 4 The function library Benefits of writing formulas in the function library Finding the right formula using insert function Outputting statistics with COUNTA and COUNTBLANK Counting criteria in a list with COUNTIFS 5 Logical IF Function Outputting results from tests Running multiple tests for multiple results The concept of outputting results from numbers 6 Conditional formatting Enabling text and numbers to standout Applying colour to data using rules Managing rules Copying rules with the format painter 7 View side by side Comparing two Excel tables together Comparing two sheets together in the same file 8 Pivot table reports Analysing data with pivot tables Managing a pivot table's layout Outputting statistical reports Controlling number formats Visualising reports with pivot charts Inserting slicers for filtering data 9 Data validation Restricting data input with data validation Speeding up data entry with data validation 10 VLOOKUP function Best practices for writing a VLOOKUP A false type lookup A true type lookup Enhance formula results with IFNA 11 Print options Getting the most from print Printing page titles across pages Scaling content for print
BGP training course description A detailed study of BGP, from the basics of how it works through to advanced issues such as route reflectors, policy, filtering, route selection and routing registries. The course culminates with a study of an industrial strength BGP template illustrating important issues such as bogon filtering. Practical hands on with routers follow the major sessions to reinforce the theory. A multiple choice exam, leading to the LAIT III certification, is available after the course. The exam consists of 60 questions and lasts 2 hours. What will you learn Connect enterprises to the Internet, and ISPs to each other. Describe how BGP works. List, describe and configure the main BGP attributes. Implement and troubleshoot BGP. Work with route aggregation and calculate CIDR prefixes in seconds. Influence traffic paths with BGP. BGP training course details Who will benefit: Anyone who will be working with BGP. Prerequisites: TCP/IP Foundation for engineers Definitive IP routing for engineers. Duration 5 days BGP training course contents Basic BGP IGPs, EGPs, What's BGP? BGP RIB, in/out process, tables peers, adding routes. Hands on Simple configuration and troubleshooting. The Internet and peering ASs, AS numbers, Internet structure, ISP types, ISP network design, IXs, peering vs. transit, public/ private peering, bi/multi-lateral peering. Hands on AS information gathering. How BGP works Incremental updates, Path vector protocols, BGP protocol stack, the BGP header, message types, NLRI, withdrawn routes, route refresh, route dampening. Hands on More troubleshooting, packet analysis. MBGP and IPv6 Multiprotocol routing, AFI, SAFI, MBGP and multicasts, IPv6, MPLS VPNs. Hands on IPv6 BGPv4 aggregation CIDR, benefits, techniques, shortcuts, configuring BGP aggregation, leaking routes. Hands on Reducing routing table size. BGP path selection BGP attributes, attribute types, route selection order, Local preference, AS prepend, MEDs. Hands on Influencing traffic with BGP. BGP routing policies What is policy? Examples, route filtering, AS filtering, REs, applying preference selectively, peer groups. Hands on Sophisticated policies. RIPE and routing registries RIRs, Allocations, assignments, PI vs. PA. Objects, RPSL, routing registry, Hands on The RIPE database. Automating BGP configuration Automation tools, whois, IRRToolSet, Bogon lists, tracking bogon lists, HTTP, Peering, routing registries, DNS. Communities What is a community? Community names, communities for: peer types and geography. RFC 1998, default communities. Hands on Setting local preference on other routers. Route servers What are route servers? LINX route servers, route server policy control, What are route collectors, Looking glasses. Hands on Setting up and working with a route server. Peer relationships IBGP, EBGP, next hop self, advertising routes into/out of BGP, synchronisation. Hands on IBGP, troubleshooting a large BGP network. Route reflectors and confederations Full mesh IBGP, Route reflectors, RR configuration and design, confederations, migration issues. Hands on RR configuration. BGP architectures Stub vs. transit AS, when to use BGP, multihoming strategies and issues, default routes. Multihop EBGP, load balancing. Hands on Multihoming. BGP security RFC 7454, security steps, BGP TTL security, filters, RPKI, ROAs, rsync, rrdp, validators. A secure BGP template. Hands on RPKI prefix validation.
Securing Linux systems training course description This course teaches you everything you need to know to build a safe Linux environment. The first section handles cryptography and authentication with certificates, openssl, mod_ssl, DNSSEC and filesystem encryption. Then Host security and hardening is covered with intrusion detection, and also user management and authentication. Filesystem Access control is then covered. Finally network security is covered with network hardening, packet filtering and VPNs. What will you learn Secure Linux accounts. Secure Linux file systems. Secure Linux access through the network. Securing Linux systems training course details Who will benefit: Linux technical staff needing to secure their systems. Prerequisites: Linux system administration (LPIC-1) Duration 5 days Securing Linux systems training course contents Cryptography Certificates and Public Key Infrastructures X.509 certificates, lifecycle, fields and certificate extensions. Trust chains and PKI. openssl. Public and private keys. Certification authority. Manage server and client certificates. Revoke certificates and CAs. Encryption, signing and authentication SSL, TLS, protocol versions. Transport layer security threats, e.g. MITM. Apache HTTPD with mod_ssl for HTTPS service, including SNI and HSTS. HTTPD with mod_ssl to authenticate users using certificates. HTTPD with mod_ssl to provide OCSP stapling. Use OpenSSL for SSL/TLS client and server tests. Encrypted File Systems Block device and file system encryption. dm-crypt with LUKS to encrypt block devices. eCryptfs to encrypt file systems, including home directories and, PAM integration, plain dm-crypt and EncFS. DNS and cryptography DNSSEC and DANE. BIND as an authoritative name server serving DNSSEC secured zones. BIND as an recursive name server that performs DNSSEC validation, KSK, ZSK, Key Tag, Key generation, key storage, key management and key rollover, Maintenance and resigning of zones, Use DANE. TSIG. Host Security Host Hardening BIOS and boot loader (GRUB 2) security. Disable useless software and services, sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration, Exec-Shield and IP / ICMP configuration, Limit resource usage. Work with chroot environments, Security advantages of virtualization. Host Intrusion Detection The Linux Audit system, chkrootkit, rkhunter, including updates, Linux Malware Detect, Automate host scans using cron, AIDE, including rule management, OpenSCAP. User Management and Authentication NSS and PAM, Enforce password policies. Lock accounts automatically after failed login attempts, SSSD, Configure NSS and PAM for use with SSSD, SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains, Kerberos and local domains, Kerberos tickets. FreeIPA Installation and Samba Integration FreeIPA, architecture and components. Install and manage a FreeIPA server and domain, Active Directory replication and Kerberos cross-realm trusts, sudo, autofs, SSH and SELinux integration in FreeIPA. Access Control Discretionary Access Control File ownership and permissions, SUID, SGID. Access control lists, extended attributes and attribute classes. Mandatory Access Control TE, RBAC, MAC, DAC. SELinux, AppArmor and Smack. etwork File Systems NFSv4 security issues and improvements, NFSv4 server and clients, NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos), NFSv4 pseudo file system, NFSv4 ACLs. CIFS clients, CIFS Unix Extensions, CIFS security modes (NTLM, Kerberos), mapping and handling of CIFS ACLs and SIDs in a Linux system. Network Security Network Hardening FreeRADIUS, nmap, scan methods. Wireshark, filters and statistics. Rogue router advertisements and DHCP messages. Network Intrusion Detection ntop, Cacti, bandwidth usage monitoring, Snort, rule management, OpenVAS, NASL. Packet Filtering Firewall architectures, DMZ, netfilter, iptables and ip6tables, standard modules, tests and targets. IPv4 and IPv6 packet filtering. Connection tracking, NAT. IP sets and netfilter rules, nftables and nft. ebtables. conntrackd Virtual Private Networks OpenVPN server and clients for both bridged and routed VPN networks. IPsec server and clients for routed VPN networks using IPsec-Tools / racoon. L2TP.