You are here

CIS271DL - GNU/Linux Security

Mesa Community College Network Academy
CIS271DL – GNU/Linux Security

Mondays and Wednesdays, 18:00 – 21:40
2012Mar19 - 2012May09

Canvas self-enrollment for class.

Call the Business and Industry Institute, 480 461 7771, and ask for Jessica in order to register for classes.

Network Security Hacks, Tips & Tools for Protecting Your Privacy Second Edition, October 2006

Andrew Lockhart
ISBN 10: 0-596-52763-2 | ISBN 13: 9780596527631

Official Course Competencies:
1. Identify and assess common Linux security risks. (I, IV)
2. Describe the function of security-awareness organizations and the role of government in security. (I, IV)
3. Explain and apply cryptography techniques including Pretty Good Privacy (PGP) and GNU Privacy Guard (GPG) utilities. (I, III, IV, V)
4. Explain the role of digital certificates and certificate authorities in ensuring Internet privacy. (IV, V)
5. Create user-level security through the creation and management of user accounts including password management, Pluggable Authentication Modules (PAM) and a variety of Linux utilities. (I, II, III, IV, V)
6. Delegate lower-level administrative responsibilities by utilizing the "Super User Do" (SUDO) utility to grant users with secure temporary administrative access to appropriate system functions. (II, III)
7. Ensure file-level security through the configuration of file permissions, the monitoring of logs, and the automation of file integrity checks using the Trip-Wire utility. (II, III, IV, V)
8. Summarize common Linux-based network security breaches that crackers attempt. (I, IV, V)
9. Implement proactive network security techniques including routing methods, Linux firewall configuration and network traffic encryption. (I, II, III, IV, V, VI, V)
10. Create and implement user, file, system, and network security policies in a Linux environment. (II, III, IV, V)
11. Utilize Linux network scanning and packet-sniffing utilities to detect network intrusions. (III, III, IV, V)
12. Automate security audits of Linux Systems. (III, IV, V)
13. Recognize and practice professional ethics at all times. (I, II, III, IV, V)

This class will be run in a FLOSS project style. This means that students will vote for and create content for the class. All class materials created will be released under at least a CC BY-SA license.

Group Type: