In this Linux Professional Institute LPIC-3 Security training course we will prepare you for the LPIC-3 certification exam 303 Security. The main goal of this training is to demonstrate your advanced Linux knowledge in the field of IT security, and not just to emphasize passing exams.
Topic 331: Cryptography
331.1 X.509 Certificates and Public Key Infrastructures
Description: Candidates should understand X.509 certificates and public key infrastructures. They should know how to configure and use OpenSSL to implement certification authorities and issue SSL certificates for various purposes.
Key Knowledge Areas:
Partial list of the used files, terms and utilities:
331.2 X.509 Certificates for Encryption, Signing and Authentication
Description: Candidates should be able to use X.509 certificates for both server and client authentication. This includes implementing user and server authentication for Apache HTTPD. The version of Apache HTTPD covered is 2.4 or higher.
Key Knowledge Areas:
Partial list of the used files, terms and utilities:
331.3 Encrypted File Systems
Description: Candidates should be able to set up and configure encrypted file systems.
Key Knowledge Areas:
The following is a partial list of the used files, terms and utilities:
331.4 DNS and Cryptography
Description: Candidates should have experience and knowledge of cryptography in the context of DNS and its implementation using BIND. The version of BIND covered is 9.7 or higher.
Key Knowledge Areas:
and NSEC3PARAM
Partial list of the used files, terms and utilities:
Topic 332: Host Security
332.1 Host Hardening
Description: Candidates should be able to secure computers running Linux against common threats.
Key Knowledge Areas:
The following is a partial list of the used files, terms and utilities:
332.2 Host Intrusion Detection
Description: Candidates should be familiar with the use and configuration of common host intrusion detection software. This includes managing the Linux Audit system and verifying a system’s integrity.
Key Knowledge Areas:
Partial list of the used files, terms and utilities:
332.3 Resource Control
Description: Candidates should be able to restrict the resources services and programs can consume.
Key Knowledge Areas:
Partial list of the used files, terms and utilities:
Topic 333: Access Control
333.1 Discretionary Access Control
Description: Candidates should understand discretionary access control (DAC) and know how to implement it using access control lists (ACL). Additionally, candidates are required to understand and know how to use extended attributes.
Key Knowledge Areas:
Partial list of the used files, terms and utilities:
333.2 Mandatory Access Control
Description: Candidates should be familiar with mandatory access control (MAC) systems for Linux. Specifically, candidates should have a thorough knowledge of SELinux. Also, candidates should be aware of other mandatory access control systems for Linux. This includes major features of these systems but not configuration and use.
Key Knowledge Areas:
Partial list of the used files, terms and utilities:
Topic 334: Network Security
334.1 Network Hardening
Description: Candidates should be able to secure networks against common threats. This includes analyzing network traffic of specific nodes and protocols.
Key Knowledge Areas:
The following is a partial list of the used files, terms and utilities:
334.2 Network Intrusion Detection
Description: Candidates should be familiar with the use and configuration of network security scanning, network monitoring and network intrusion detection software. This includes updating and maintaining the security scanners.
Key Knowledge Areas:
Partial list of the used files, terms and utilities:
334.3 Packet Filtering
Description: Candidates should be familiar with the use and configuration of the netfilter Linux packet filter.
Key Knowledge Areas:
Partial list of the used files, terms and utilities:
334.4 Virtual Private Networks
Description: Candidates should be familiar with the use of OpenVPN, IPsec and WireGuard to set up remote access and site to site VPNs.
Key Knowledge Areas:
Partial list of the used files, terms and utilities:
Topic 335: Threats and Vulnerability Assessment
335.1 Common Security Vulnerabilities and Threats
Description: Candidates should understand the principle of major types of security vulnerabilities and threats.
Key Knowledge Areas:
The following is a partial list of the used files, terms and utilities:
335.2 Penetration Testing
Description: Candidates understand the concepts of penetration testing, including an understand of commonly used penetration testing tools. Furthermore, candidates should be able to use nmap to verify the effectiveness of network security measures.
Key Knowledge Areas:
Partial list of the used files, terms and utilities:
In this Linux Professional Institute LPIC-3 Security training course we will prepare you for the LPIC-3 certification exam 303 Security. The main goal of this training is to demonstrate your advanced Linux knowledge in the field of IT security, and not just to emphasize passing exams.
Topic 331: Cryptography
331.1 X.509 Certificates and Public Key Infrastructures
Description: Candidates should understand X.509 certificates and public key infrastructures. They should know how to configure and use OpenSSL to implement certification authorities and issue SSL certificates for various purposes.
Key Knowledge Areas:
Partial list of the used files, terms and utilities:
331.2 X.509 Certificates for Encryption, Signing and Authentication
Description: Candidates should be able to use X.509 certificates for both server and client authentication. This includes implementing user and server authentication for Apache HTTPD. The version of Apache HTTPD covered is 2.4 or higher.
Key Knowledge Areas:
Partial list of the used files, terms and utilities:
331.3 Encrypted File Systems
Description: Candidates should be able to set up and configure encrypted file systems.
Key Knowledge Areas:
The following is a partial list of the used files, terms and utilities:
331.4 DNS and Cryptography
Description: Candidates should have experience and knowledge of cryptography in the context of DNS and its implementation using BIND. The version of BIND covered is 9.7 or higher.
Key Knowledge Areas:
and NSEC3PARAM
Partial list of the used files, terms and utilities:
Topic 332: Host Security
332.1 Host Hardening
Description: Candidates should be able to secure computers running Linux against common threats.
Key Knowledge Areas:
The following is a partial list of the used files, terms and utilities:
332.2 Host Intrusion Detection
Description: Candidates should be familiar with the use and configuration of common host intrusion detection software. This includes managing the Linux Audit system and verifying a system’s integrity.
Key Knowledge Areas:
Partial list of the used files, terms and utilities:
332.3 Resource Control
Description: Candidates should be able to restrict the resources services and programs can consume.
Key Knowledge Areas:
Partial list of the used files, terms and utilities:
Topic 333: Access Control
333.1 Discretionary Access Control
Description: Candidates should understand discretionary access control (DAC) and know how to implement it using access control lists (ACL). Additionally, candidates are required to understand and know how to use extended attributes.
Key Knowledge Areas:
Partial list of the used files, terms and utilities:
333.2 Mandatory Access Control
Description: Candidates should be familiar with mandatory access control (MAC) systems for Linux. Specifically, candidates should have a thorough knowledge of SELinux. Also, candidates should be aware of other mandatory access control systems for Linux. This includes major features of these systems but not configuration and use.
Key Knowledge Areas:
Partial list of the used files, terms and utilities:
Topic 334: Network Security
334.1 Network Hardening
Description: Candidates should be able to secure networks against common threats. This includes analyzing network traffic of specific nodes and protocols.
Key Knowledge Areas:
The following is a partial list of the used files, terms and utilities:
334.2 Network Intrusion Detection
Description: Candidates should be familiar with the use and configuration of network security scanning, network monitoring and network intrusion detection software. This includes updating and maintaining the security scanners.
Key Knowledge Areas:
Partial list of the used files, terms and utilities:
334.3 Packet Filtering
Description: Candidates should be familiar with the use and configuration of the netfilter Linux packet filter.
Key Knowledge Areas:
Partial list of the used files, terms and utilities:
334.4 Virtual Private Networks
Description: Candidates should be familiar with the use of OpenVPN, IPsec and WireGuard to set up remote access and site to site VPNs.
Key Knowledge Areas:
Partial list of the used files, terms and utilities:
Topic 335: Threats and Vulnerability Assessment
335.1 Common Security Vulnerabilities and Threats
Description: Candidates should understand the principle of major types of security vulnerabilities and threats.
Key Knowledge Areas:
The following is a partial list of the used files, terms and utilities:
335.2 Penetration Testing
Description: Candidates understand the concepts of penetration testing, including an understand of commonly used penetration testing tools. Furthermore, candidates should be able to use nmap to verify the effectiveness of network security measures.
Key Knowledge Areas:
Partial list of the used files, terms and utilities: