You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
<h1>ProLUG System Administration for the Enterprise</h1>
4
+
<h1>ProLUG Security Engineering Course</h1>
5
5
</p>
6
6
</div>
7
7
8
-
Welcome to the ProLUG Enterprise Linux System Administration Course Book.
8
+
Welcome to the ProLUG Security Engineering Course Book.
9
9
10
10
## This Book
11
11
@@ -18,32 +18,33 @@ Furthermore, the book has been built with mdbook for ease of navigation. Be sure
18
18
19
19
## This Course
20
20
21
-
Addresses how the Linux systems work for administration level tasks inside a corporate environment. This course will explore everything from the administration of a Linux server and fundamental command line tasks to advanced topics such as patching and web administration.
21
+
This course addresses how to secure Linux a corporate environment. This course will focus on adhering to regulations, best practices, and industry standards. This course will expose the concepts of controls, their implementation, and how they fit into overall security posture. The learner will practice securely building, deploying, integrating, and monitoring Linux systems. Standard security documentation and reporting will be practiced throughout, to better prepare the learner for the industry.
22
22
23
23
## Major Instructional Areas
24
24
25
-
- Server build and Hardware components
26
-
- Command Line tools and Syntax
27
-
- Basic Scripting
28
-
- Linux networking
29
-
- Linux security practices
30
-
- Automation and repeating tasks
31
-
- Implement Networking in Linux
32
-
- Troubleshooting
33
-
- Benchmarking and Baselining
25
+
- Build Standards and Compliance.
26
+
- Securing the Network Connection.
27
+
- User Access and System Integration.
28
+
- Bastion Hosts and Air-Gaps.
29
+
- Updating Systems and Patch Cycles.
30
+
- Monitoring and Parsing Logs.
31
+
- Monitoring and Alerting.
32
+
- Configuration drift and Remediation.
33
+
- Certificate and Key Madness.
34
+
34
35
35
36
## Course objectives
36
37
37
-
- Explain the server build process and hardware system components.
38
-
-Analyze system security and implement basic hardening of system.
39
-
-Construct command line syntax to explore the system and gather resource information.
40
-
-Construct scripting structures of assigning variables, conditional tests, and recording output to
41
-
generate scripts that do basic system tasks.
42
-
-Analyze and troubleshoot the Apache Web Server
43
-
-Analyze and troubleshoot the NFS/Samba File Shares.
44
-
-Analyze Docker and Kubernetes components and workflows.
45
-
-Describe and troubleshoot network services.
46
-
- Write and perform Ansible tasks to automate deployments to servers.
38
+
39
+
-Build and configure a Linux system to adhere to compliance frameworks.
40
+
-Integrating Linux to a network in a secure fashion.
41
+
-Integrating Linux with Enterprise Identity and Access (IAM) frameworks.
42
+
- Implement User ingress controls to a system/network with bastion frameworks.
43
+
-Updating Linux to resolve security vulnerabilities and reporting out to security teams.
44
+
-Design logging workflows to move event logging off of systems for real time monitoring.
45
+
-Monitoring and alerting on events in Linux.
46
+
-Maintaining system configuration and remediating drift.
Building standards and compliance in cybersecurity engineering ensures that systems adhere to industry best practices, regulatory requirements, and security frameworks, reducing risks and vulnerabilities. By implementing structured guidelines and continuous monitoring, organizations can maintain resilience against evolving threats while ensuring accountability and regulatory alignment.
11
+
12
+
### What is the skill/tech/concept we are dealing with?
13
+
14
+
1.
15
+
2.
16
+
3.
17
+
18
+
etc..
19
+
20
+
## Learning Objectives
21
+
22
+
(Objectives and learning goals related to the unit)
23
+
24
+
## Relevance & Context
25
+
26
+
(Contextualize the unit content to systems administration)
27
+
28
+
### Why is it important to Linux Administrators/Engineers?
29
+
30
+
1.
31
+
2.
32
+
3.
33
+
34
+
etc..
35
+
36
+
## Prerequisites
37
+
38
+
(Any unit prerequisite knowledge)
39
+
40
+
### Briefly mention concepts or skills the reader should already understand before starting the chapter.
Copy file name to clipboardExpand all lines: src/u1ws.md
+100Lines changed: 100 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,3 +4,103 @@
4
4
<h1>Under Construction</h1>
5
5
</p>
6
6
</div>
7
+
8
+
Build Standards and Compliance. Building standards and compliance in cybersecurity engineering ensures that systems adhere to industry best practices, regulatory requirements, and security frameworks, reducing risks and vulnerabilities. By implementing structured guidelines and continuous monitoring, organizations can maintain resilience against evolving threats while ensuring accountability and regulatory alignment.
9
+
10
+
### Resources / Important Links
11
+
12
+
-[American Government STIG Profiles](https://public.cyber.mil/stigs/downloads/)
0 commit comments