In our computing world, there are two major operating systems, languages if you will. And while Windows is more prevalent in the market, Linux has become the language of scripting and creating programs to examine and test security systems. Never the less, understanding each of them is a prerequisite to being able to complete this puzzle we are working on.
Purpose of Class:
This course focuses on configuring a secure Linux network using command line and graphical utilities. Emphasis is placed on file sharing technologies such as the Network File System, NetWare’s NCP file sharing, and File Transfer Protocol. Additional topics include making data secure, user security, file security, and network intrusion detection. Students will be required to take on the role of problem solvers and apply the concepts presented to situations that might occur in a work environment.
Course Learning Outcomes:
Students who successfully complete this class will be able to:
- Use research to understand the fundamentals of Linux platform and analyze the file system.
- Analyze different security vulnerabilities, threats and attacks on Linux systems and networks, and recommend the countermeasures for the same based on relevant research, evidence and references.
- Examine various security mechanisms available for securing Linux hosts and networks, and frame policies, guidelines and best practices for information security in the organization.
- Identify the basic Linux networking concepts, recognize various networking devices and protocols, and define relevant evidence used to determine strategies for implementing a secure Linux network.
- Compare and contrast various tools to protect, test and monitor the security of Linux systems and implement appropriate level of security controls based on evidence, information, and research.
|ECCU 518: Special Topics: Introduction to Cloud Computing||Master of Science in Cyber Security|
|ECCU 517: Cyber Law||Master of Science in Cyber Security|
|ECCU 516: The Hacker Mind: Profiling the IT Criminal||Master of Science in Cyber Security|