Corder Enterprises International (C.E.I.)
A Divider
1980 - 2016 Years of Service
Corder Enterprises International
A Divider
Go Green Gif The green data center
The Green Datacenter
A Divider Home
Training Offered by The Corder Company
The History of The Corder Company
The History of The Corder Company
e-Mail The Corder Company
e-Mail The Corder Company
VMware Training Courses
Site Map for C.E.I.
A Divider
AIX Training Courses
Solaris Training Courses
Linux Training Courses
Perl Training Courses
HTML Training Courses

E-Mail This Page
To a Friend.
Name Tag JPG
Now Hiring
Certified VMware Professional, VCP
VCP & VCIs

Fish GIF
1-Chronicles 4:10

Building World Class Teams
For you!®

Columbus

SPACER SPACER SPACER SPACER SPACER SPACER SPACER SPACER SPACER

    CU006 - UNIX Security for Users

    Length: 1 Day

    Description

    This seminar is designed to make all users aware of the UNIX security vulnerabilities and show them how to prevent an unauthorized user from compromising their login account or data. The security features which are provided as part of the operating system are first discussed. Then, some of the ways in which unauthorized people may use to gain access to a UNIX system or another users files and directories are discussed. Next, the ways of preventing unauthorized access are described in detail, along with exact descriptions of each UNIX command and the way it is used. Each attendee will be provided with a self-assessment checklist and sample programs which will allow them to perform a personal audit on their account. The seminar concludes with a discussion of the actions a user should take if they suspect compromise of their login and/or files.

    Course Objectives

    Upon completion of this seminar the attendee will be able to:
    1. state the security features of UNIX;
    2. identify methods used to gain unauthorized access;
    3. describe how unauthorized access can be prevented;
    4. perform a self-audit on your login, files and directories;
    5. state the actions to take if compromise is suspected.

    Course Materials

    1. UNIX Security for Users Student Guide and course notes.
    2. User Security Checklist
    3. Sample Audit Programs

    Prerequisites

    1. None

    Course Content

    1. UNIX SECURITY CONCERNS
      1. Unauthorized Access by Trusted Users
      2. Unauthorized Access by Hackers
    2. UNIX SECURITY FEATURES
      1. Login
      2. Passwords
      3. File/Directory Access Permissions
        1. User
        2. Group
        3. Other
      4. umask
      5. Terminal Security
      6. Network Security
    3. METHODS USED TO GAIN UNAUTHORIZED ACCESS
      1. Loaned Out Logins
      2. Password Compromise
      3. File/Directory Permissions
      4. Tricking Authorized Users/System Administrators
      5. Problems in System Programs
      6. Intelligent Terminals
    4. PROTECTING YOUR LOGIN, FILES, AND DIRECTORIES
      1. What to Look For
      2. User Responsibilities
        1. Setting Up The Environment (PATH)
        2. Changing File Access Permissions
        3. Changing File Ownership
        4. Changing File Group
        5. Checking File/Directory Access Permissions
        6. Last Login
        7. Auto Logoff
        8. Terminal Locking
        9. Data Encryption
      3. System Administrator Responsibilities
        1. Audits
        2. Access Modes
        3. Preventing Use of System Program Problems
      4. What to do if compromise is suspected
    5. COURSE CONCLUSION

    pdf icon gif
    Course
    Flyer
    pdf icon gif
    C.E.I.
    Flyer
    pdf icon gif
    Course
    Offering
    3mb
    AIX | HPUX | Linux | Solaris
    General UNIX | Web | Perl
    Copywrite 1980 - 2015
    VMware Certified Instructor