We may earn an affiliate commission when you visit our partners.
Andrew Mallett

Security is an ever growing concern no matter which operating system you employ. This course will not only get you ready for your LPIC-2 202 exam but prepare you in securing your Linux Server.

Read more

Security is an ever growing concern no matter which operating system you employ. This course will not only get you ready for your LPIC-2 202 exam but prepare you in securing your Linux Server.

When larger corporations and government bodies struggle with security on their computer systems you start to realize the gravity of the situation. In this course, Linux System Security LPIC-2, you will learn the foundational knowledge of securing your Linux server, giving you the opportunity to block threats before they turn into attacks. First, you will learn how to create and manage routers and route tables on your network, isolating servers from internet threats. Next, you will discover the skills behind firewalling your networks, allowing clients access with NAT, and access to servers using port forwarding. Finally, you will explore how to asses weaknesses in your OS with OpenVAS and detect intruders with the Snort IDS. When you’re finished with this course, you will have the skills and knowledge of security needed to protect your networks and Linux servers.

Enroll now

What's inside

Syllabus

Course Overview
Introduction to Linux Security
The Lab Environment
Configuring Routing Between Networks
Read more
Configuring Firewalls
Dynamic Firewalls with Fail2ban
Securing OpenSSH
Securing FTP Services
Monitoring Systems
Virtual Private Networks

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Explores industry standard tools and methods for securing servers
Covers firewalls, VPNs, intrusion detection systems, and more
Taught by an industry expert, Andrew Mallett
Prepares learners for the LPIC-2 certification exam

Save this course

Save Linux: System Security (LPIC-2) to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Linux: System Security (LPIC-2) with these activities:
Review Linux Networking
Review key concepts in Linux networking to enhance your understanding of server security.
Browse courses on Linux Networking
Show steps
  • Read articles, documentation, or blog posts about Linux networking
  • Take a practice quiz on Linux networking concepts
Review basic networking concepts
Review the basics of networking to refresh your understanding of IP addresses, routing, and TCP/IP.
Browse courses on Networking
Show steps
  • Revisit your notes or an introductory networking textbook.
  • Go through online resources and tutorials on basic networking.
  • Practice subnetting exercises to reinforce your understanding of IP addressing.
Study Network Security Fundamentals
Gain a foundation of security fundamentals to prepare for learning how to secure a Linux server.
Show steps
  • Read chapters 1-5 of the book, taking notes on key concepts
  • Summarize the main ideas from each chapter in your own words
25 other activities
Expand to see all activities and additional details
Show all 28 activities
Join a study group or discussion forum related to Linux security
Engage with peers to discuss course topics, share knowledge, and clarify concepts.
Show steps
  • Find a study group or discussion forum dedicated to Linux security.
  • Introduce yourself and actively participate in discussions.
  • Ask questions, share your insights, and collaborate with others.
Refresh knowledge of network protocols
Reviewing the foundational concepts of network protocols will strengthen your understanding of how networks operate.
Browse courses on TCP/IP
Show steps
  • Review materials from previous networking courses or textbooks
  • Complete practice exercises on subnetting and routing
Review networking fundamentals
Solidify a knowledge base in the core concepts of networking.
Browse courses on Networking Fundamentals
Show steps
  • Review OSI model and TCP/IP stack.
  • Go over common networking protocols.
  • Practice subnetting.
Attend a security conference or meetup
Network with other security professionals and learn about the latest trends in the field.
Show steps
  • Find security conferences or meetups in your area or online.
  • Register for the event and prepare any necessary materials.
  • Attend the event, participate in discussions, and connect with others.
  • Follow up with any contacts you made and continue the conversation online.
Participate in a study group for network security concepts
Engaging in discussions with peers can enhance understanding and reinforce knowledge through different perspectives.
Show steps
  • Join or create a study group with other students
  • Meet regularly to discuss course materials and work on practice problems
  • Provide support and share insights within the group
Configure Routing Tables
Practice configuring routing tables to isolate servers from internet threats.
Browse courses on Routing Tables
Show steps
  • Set up a lab environment with multiple virtual machines
  • Configure routing tables on each virtual machine
  • Test the routing configuration using ping and traceroute
Follow tutorials on firewall configuration
Get hands-on experience in configuring firewalls by following step-by-step tutorials.
Browse courses on Firewalls
Show steps
  • Find online tutorials or courses on firewall configuration.
  • Set up a virtual environment or use a cloud platform to practice.
  • Follow the instructions in the tutorial to configure firewall rules.
  • Test your firewall configuration by simulating attacks or using a security scanner.
Practice configuring and managing routers and firewalls
Hands-on practice with configuring and managing network devices will enhance your ability to secure your Linux servers.
Browse courses on Router Configuration
Show steps
  • Set up a virtual environment for network configuration
  • Configure static and dynamic routing between networks
  • Configure basic firewall rules to restrict network access
Linux Security Community Forum Participation
Engage with peers and experts to ask questions, share knowledge, and stay updated on the latest security trends.
Browse courses on Peer Support
Show steps
  • Join an online Linux security community forum.
  • Participate in discussions and ask questions related to the course material.
  • Offer support to other members.
Configure IPv6 Routing
Practice configuring IPv6 routing to solidify understanding of network configuration and security.
Browse courses on IPv6 Routing
Show steps
  • Set up a virtual network environment
  • Configure IPv6 addresses for interfaces
  • Add IPv6 routes
  • Verify IPv6 connectivity
Follow tutorials on managing OpenSSH and FTP services securely
Completing tutorials will provide practical experience in securing specific services commonly used on Linux servers.
Show steps
  • Identify reputable sources for OpenSSH and FTP security tutorials
  • Follow the tutorials and implement the recommended security measures
  • Test the effectiveness of the implemented security measures
Create a Firewall with iptables
Follow tutorials to create a firewall using iptables, enhancing practical knowledge of firewall management.
Browse courses on IPTables
Show steps
  • Install and configure iptables
  • Set up firewall rules
  • Test and monitor firewall
Firewall Management with UFW
Follow guided tutorials to enhance your skills in firewall management.
Browse courses on UFW
Show steps
  • Find a tutorial on UFW firewall management
  • Set up a lab environment to practice the steps in the tutorial
  • Follow the tutorial steps to configure a firewall using UFW
Attend a workshop on Linux security best practices
Attending a workshop can provide practical guidance and insights from industry experts, supplementing the knowledge gained in the course.
Show steps
  • Research and identify relevant workshops
  • Register and attend the workshop
  • Take detailed notes and ask questions during the workshop
Analyze System Logs
Practice analyzing system logs to identify potential security threats and weaknesses.
Browse courses on System Logs
Show steps
  • Gather and review system logs
  • Look for suspicious entries
  • Correlate log entries
Practice log analysis exercises
Develop your log analysis skills by working through practice exercises and real-world log files.
Browse courses on Log Analysis
Show steps
  • Find online resources or tools that provide log analysis exercises.
  • Download sample log files or use a log simulator.
  • Analyze the logs to identify security incidents, patterns, or anomalies.
  • Document your findings and recommendations.
  • Compare your results with others or seek feedback from experienced professionals.
Develop a security plan for a small network
Creating a security plan will help you apply the concepts learned in the course to a real-world scenario, solidifying your understanding.
Show steps
  • Identify the assets and threats in the network
  • Design a security architecture to mitigate identified threats
  • Document the security plan, including policies and procedures
Configure iptables firewall
Gain hands-on experience in one of the most widely-used firewalls for Linux.
Browse courses on Firewall Configuration
Show steps
  • Set up practice lab environment.
  • Follow an online tutorial to configure basic firewall rules.
  • Experiment with advanced rules and troubleshoot the configurations.
Develop a Security Plan
Create a security plan to demonstrate your understanding of securing a Linux server.
Browse courses on Security
Show steps
  • Identify the assets and threats to your Linux server
  • Develop a strategy to mitigate the identified threats
  • Create a written security plan that outlines your strategy
Write a blog post on a security best practice
Solidify your understanding of a security best practice by explaining it in a blog post.
Show steps
  • Choose a security best practice that you want to delve deeper into.
  • Research the topic thoroughly and gather relevant information.
  • Write a blog post outlining the best practice, its benefits, and how to implement it.
  • Share your blog post with others for feedback and discussion.
Security auditing with OpenVAS
Become proficient in using OpenVAS to identify vulnerabilities in your Linux systems.
Show steps
  • Install and set up OpenVAS on a practice server.
  • Run scans and analyze the results.
  • Remediate the vulnerabilities found.
Write a Blog Post on Security Best Practices
Create a blog post on security best practices to share your knowledge with others.
Browse courses on Security Best Practices
Show steps
  • Identify common security risks and vulnerabilities
  • Research and compile best practices to mitigate these risks
  • Write a blog post outlining the best practices and how to implement them
Mentor a junior security professional
Share your knowledge and experience by mentoring someone new to the field of Linux security.
Show steps
  • Identify a junior security professional who would benefit from mentorship.
  • Set clear goals and expectations for the mentorship program.
  • Provide guidance, support, and resources to the mentee.
  • Regularly check in with the mentee to assess their progress and provide feedback.
Linux Security Policy
Enhance your understanding of security concepts by creating a comprehensive Linux security policy.
Browse courses on Security Policy
Show steps
  • Research best practices and industry standards for Linux security.
  • Document the policy in a clear and concise manner.
  • Implement the policy on a test system and monitor its effectiveness.
Contribute to a Network Security Project
Contribute to a network security project on GitHub to gain practical experience.
Browse courses on Open Source
Show steps
  • Find an open-source network security project on GitHub
  • Identify a way to contribute to the project
  • Submit a pull request with your contribution

Career center

Learners who complete Linux: System Security (LPIC-2) will develop knowledge and skills that may be useful to these careers:
Linux Administrator
Protect critical data and applications by learning how to manage routers and route tables on your network with this course. You will become familiar with isolating servers from internet threats through firewalling your networks. You will also learn to assess weaknesses in your OS with OpenVAS and detect intruders with the Snort IDS, skills considered essential for a Linux Administrator.
Systems Administrator
In this role, you must secure and maintain computer systems and networks. This course, which covers network security, router management, and intrusion detection, can help you gain a competitive edge by building a foundation of security skills.
Cybersecurity Analyst
A Cybersecurity Analyst must know how to find and prevent security breaches, and this course in Linux System Security covers skills that can help you to stand out to employers, including threat detection, intrusion prevention, and security monitoring.
Network Administrator
Upon completing this course, you will be familiar with managing routers and route tables, as well as firewalling networks, skills that are in-demand by employers of Network Administrators.
Security Engineer
A Security Engineer uses firewalls, intrusion detection tools, and more to secure applications and data, and this course in Linux System Security may be of interest to those looking to enter the field.
Cloud Security Engineer
This course helps teach foundational knowledge for securing a Linux server, a valuable skill for those who wish to enter the emerging role of Cloud Security Engineer.
Security Auditor
Security Auditors must understand how to assess security vulnerabilities, and this course may be useful in helping you to build a foundation in this area with its focus on tools like OpenVAS and Snort IDS.
IT Manager
Relevant to those seeking a career as an IT Manager, this course can help you to develop an understanding of fundamental security principles that can help you manage the information security demands of a growing organization.
Information Security Officer
This course may be helpful to those interested in working as an Information Security Officer who want to learn about threat detection, intrusion prevention, and security monitoring.
IT Security Manager
This course may be of interest to aspiring IT Security Managers who are looking to gain an overview of Linux system security principles and tools.
Network Security Consultant
For those who want to become a security consultant specializing in networks, this course covers router management, firewalling, and intrusion detection, skills that may be useful for excelling in this role.
IT Consultant
IT Consultants must be well-versed in a range of IT security topics, and this course may be of interest to those looking to gain a foundation in linux systems security.
Computer Forensic Analyst
This course can be helpful for Computer Forensic Analysts who need to stay current on the latest security threats and trends.
Security Analyst
Security Analysts must be up-to-date on the latest security threats and trends, and this course can help you to gain a foundational understanding of linux system security.
Data Analyst
This course may be of interest to Data Analysts who wish to gain a basic understanding of linux systems security.

Reading list

We've selected 11 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Linux: System Security (LPIC-2).
Provides a comprehensive overview of cloud security principles and practices.
Provides a comprehensive overview of security in computing systems.
Provides a comprehensive guide to using Security Onion, the open source intrusion detection and security monitoring platform.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Linux: System Security (LPIC-2).
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser