Security and Audit of Unix
Available from MIS Training Institute
In this hands-on, five-day seminar from MIS Training Institute you will go through the steps to take to audit and analyze the security of a Unix-based system. You will begin by reviewing a typical Unix system that has been salted with common configuration errors for you to discover. You will evaluate the system’s user access controls, examine standard system logs, analyze the effect of file and directory permissions, search for special files that allow users extended capabilities, and evaluate the risks of system processes. You will learn how to use the Unix shell, the standard user interface, to navigate the system, test file and directory access controls, access and manage files, use the system search tools, and capture evidence with shell redirection. So that you can review shell scripts that control many of the operations of a Unix-based server, you’ll cover the basics of shell programming. Since servers use network interfaces to provide their service, you will also learn how to review Unix network control files and evaluate the risks of selected common network services. You will explore add-on security tools and conduct a head-to-head comparison of the key features and capabilities of each of the major Unix-based operation systems, including Solaris, AIX, HP-UX, Tru-64, and the most popular Linux varieties.