ITSM 2433: Cyber Security With Linux

Credit Hours 3.0 Lecture Hours 2.0 Lab Hours 2.0
Type of Credit
Occupational/Technical
View Class Schedule
Course Description
This course provides a comprehensive introduction to Linux operating systems with a focus on its application in cybersecurity. Students will delve into the fundamental concepts of Linux, gaining practical skills and knowledge essential for securing Linux-based systems. Through hands-on labs, and interactive exercises, participants will learn how to navigate the Linux environment, manage users and permissions, configure networking settings, and implement security measures to protect against common cyber threats. ITSM 1423 is recommended; and familiarity with command-line interfaces and basic system administration tasks is recommended before enrollment.
Prerequisite(s)
An understanding of computer systems and networking concepts - - Must be completed prior to taking this course.

At the end of this course, students will be able to:

  • Demonstrate proficiency in fundamental Linux concepts.
  • Work effectively in the command line environment.
  • Implement and configure Linux network services.
  • Manage local and network storage.
  • Manage group and user accounts.
  • Implement security principles specific to Linux systems such as securing user accounts, configuring access controls, managing services securely.
  • Configure firewalls to protect against common threats and vulnerabilities.
  • Implement effective scripting and automation.
  • Use various Linux security tools and utilities for tasks such as network scanning, intrusion detection, log analysis, forensics, and encryption.
  • Perform network footprinting.
  • Start, view and control system processes.
  • Be better prepared to take industry certification exams.
Topical Outline

· Distributions and key components

· Working at the command line

· Editing files

· Troubleshooting and getting help

· Managing group and user accounts

· Creating account security policies

· Securing files using Linux permissions

· Managing local and network storage

· Developing storage security policies

· Using crontab and at

· Writing scripts

· Using common automation tools

· Developing an automation security policy

· Networking basics and configuration

· Network services configuration

· Connecting to remote systems

· Developing a network security policy

· Starting, viewing, and controlling processes

· System logging

· Red Hat and Debian software management

· System booting

· Developing a software management security policy

· Footprinting

· Firewalls

· Intrusion detection