SEC506: Securing Linux/Unix
- Contents | Schedule | Additional Info
- Instructor: Hal Pomeranz
- GCUX Certification
- 36 CPE/CMU
- Laptop Required
Experience in-depth coverage of Linux and Unix security issues. Examine how to mitigate or eliminate general problems that apply to all Unix-like operating systems, including vulnerabilities in the password authentication system, file system, virtual memory system, and applications that commonly run on Linux and Unix. This course provides specific configuration guidance and practical, real-world examples, tips, and tricks.
Throughout this course you will become skilled at utilizing freely available tools to handle security issues, including SSH, AIDE, sudo, lsof, and many others. SANS' practical approach with hands-on exercises every day ensures that you can start using these tools as soon as you return to work. We will also put these tools to work in a special section that covers simple forensic techniques for investigating compromised systems.
- Memory Attacks, Buffer Overflows
- File System Attacks, Race Conditions
- Trojan Horse Programs and Rootkits
- Monitoring and Alerting Tools
- Unix Logging and Kernel-Level Auditing
- Building a centralized logging infrastructure
- Network Security Tools
- SSH for Secure Administration
- Server lockdown for Linux and Unix
- Controlling root access with sudo
- SELinux and chroot() for application security
- DNSSEC deployment and automation
- mod_security and Web Application Firewalls
- Secure Configuration of BIND, Sendmail, Apache
- Forensic Investigation
| Course Contents | Instructors | Schedule |
|---|---|---|
| SEC506.1: Hardening Linux/Unix Systems, Part 1 | Hal Pomeranz |
Mon Sep 16th, 2013 9:00 AM - 5:00 PM |
OverviewThis course tackles some of the most important techniques for protecting your Linux/Unix systems from external attacks. But it also covers what those attacks are so that you know what you're defending against. This is a full-disclosure course with in-class demos of actual exploits and hands-on exercises to experiment with various examples of malicious software, as well as different techniques for protecting Linux/Unix systems. CPE/CMU Credits: 6 TopicsMemory Attacks and Overflows
Vulnerability Minimization
Boot-Time Configuration
Encrypted Access
Host-Based Firewalls
|
||
| SEC506.2: Hardening Linux/Unix Systems, Part 2 | Hal Pomeranz |
Tue Sep 17th, 2013 9:00 AM - 5:00 PM |
OverviewContinuing our exploration of Linux/Unix security issues, this course focuses in on local exploits and access control issues. What do attackers do once they gain access to your systems? How can you detect their presence? How do you protect against attackers with physical access to your systems? What can you do to protect against mistakes (or malicious activity) by your own users? CPE/CMU Credits: 6 TopicsRootkits and Malicious Software
File Integrity Assessment
Physical Attacks and Defenses
User Access Controls
Root Access Control With Sudo
Warning Banners
Kernel Tuning For Security
|
||
| SEC506.3: Hardening Linux/Unix Systems, Part 3 | Hal Pomeranz |
Wed Sep 18th, 2013 9:00 AM - 5:00 PM |
OverviewMonitoring your systems is critical for maintaining a secure environment. This course digs into the different logging and monitoring tools available in Linux/Unix, and looks at additional tools for creating a centralized monitoring infrastructure such as Syslog-NG. Along the way, the course introduces a number of useful SSH tips and tricks for automating tasks and tunneling different network protocols in a secure fashion. CPE/CMU Credits: 6 TopicsAutomating Tasks With SSH
AIDE Via SSH
Linux/Unix Logging Overview
SSH Tunneling
Centralized Logging With Syslog-NG
|
||
| SEC506.4: Application Security, Part 1 | Hal Pomeranz |
Thu Sep 19th, 2013 9:00 AM - 5:00 PM |
OverviewThis course examines common application security tools and techniques. The SCP-Only Shell will be presented as an example of using an application under chroot() restriction, and as a more secure alternative to file sharing protocols like anonymous FTP. The SELinux application whitelisting mechanism will be examined in depth. Tips for troubleshooting common SELinux problems will be covered and students will learn how to craft new SELinux policies from scratch for new and locally developed applications. Significant hands-on time will be provided for students to practice these concepts. CPE/CMU Credits: 6 Topicschroot() for Application Security
The SCP-Only Shell
SELinux Basics
SELinux and the Reference Policy
Application Security Challenge Exercise |
||
| SEC506.5: Application Security, Part 2 | Hal Pomeranz |
Fri Sep 20th, 2013 9:00 AM - 5:00 PM |
OverviewThis course is a full day of in-depth analysis on how to manage some of the most popular application level services securely on a Linux/Unix platform. We will tackle the practical issues involved with securing the three of the most commonly used Internet servers on Linux and Unix: BIND, Sendmail, and Apache. Beyond basic security configuration information, we will take an in-depth look at topics like DNSSec and Web Application Firewalls with mod_security and the Core Rules. CPE/CMU Credits: 6 TopicsBIND
DNSSec
Sendmail
Apache
Web Application Firewalls with mod_security
|
||
| SEC506.6: Digital Forensics for Linux/Unix | Hal Pomeranz |
Sat Sep 21st, 2013 9:00 AM - 5:00 PM |
OverviewThis hands-on course is designed to be an information-rich introduction devoted to basic forensic principals and techniques for investigating compromised Linux and Unix systems. At a high level, it introduces the critical forensic concepts and tools that every administrator should know and provides a real-world compromise for students to investigate using the tools and strategies discussed in class. CPE/CMU Credits: 6 TopicsTools Throughout
Forensic Preparation and Best Practices
Incident Response and Evidence Acquisition
Media Analysis
Incident Reporting
|
||
| Additional Information | ||
| Laptop Required | ||
|
Each student should bring a properly configured laptop to class EVERY DAY. We will be using a number of different VMware images during the class, which will be provided to students on a DVD (yours to keep after the class is over). So it's important that the laptop you bring to class has a working DVD reader, enough disk space to unpack the VMware images, and enough CPU power and memory to run multiple VMware images simultaneously. We recommend the following minimum hardware:
Operating System: Since we will be using VMware, you do not have to have Unix/Linux installed natively on your laptop (though you are welcome to do so if you like). Whatever operating system you choose, it is your responsibility to ensure that VMware is installed and working BEFORE arriving in class. VMware Product Choice: The VMware images provided in class should work with either the free VMware Player or Server products as well as VMware Workstation. Students have also used VMware Fusion on MacOS successfully. Expect the Worst: It is your responsibility to fully back up your system prior to class. If you have additional questions about the laptop specifications, please contact laptop_prep@sans.org. |
||
| Who Should Attend | ||
|
||
| Prerequisites | ||
Students must possess at least a working knowledge of Unix. Most students who attend this course have a minimum of 3-5 years of Unix system administration experience. |
||
| You Will Be Able To | ||
|
||
