Linux Hacking

This course is included in our On-demand training solution.

Overview

The various distributions of Linux are becoming more and more popular. This course examines the history of Linux, the different flavors that are available, and the file structures used. This course also examines the methods that can be used to secure Linux systems, along with the tools that can be used both to test the security, and to penetrate it. Finally, this course examines the countermeasures that can be put in place to maintain the security of Linux systems. This course also assists students who are preparing for the EC Council’s Ethical Hacking and Countermeasures (CEHv6) exam 312-50.

Target Audience

Existing or in-training IT security professionals seeking detailed security penetration testing skills.

Prerequisites

A technical background with a solid understanding of networks and networking concepts, such as TCP/IP, IP Routing, and LAN Switching, as well as Windows and/or UNIX/LINUX operating systems; a general familiarity with the principles and usage of command-line, coding, and GUI-based technologies for manipulating IT operating systems

Expected Duration

60 min.

Course Objectives

Introduction to Linux

  • sequence the steps to compile a Linux kernel
  • assign specific permissions to a file or directory in Linux
  • Linux Hacker Tools

  • recognize the purposes of Linux hacking tools
  • Linux Security Measures

  • recognize the purpose of Linux security tools
  • Linux Commands and Hacking Tools

    SUBSCRIPTION COST



     

    NEED HELP OR NOT SURE?