Home | Site Map | Search | Contacts
About Us
News
Events
Resources
Report Incidents
Incident Statistics
Security FAQS
Training
Vacancies
Links

Search NISER
NISER > Training > NISER's UNIX System Administration Security Training
UNIX System Administration Security Training | Windows 2000 Security & Advanced Administration Training | Introduction to Computer Forensics | Incident Response and Handling | Registration Form
(PDF) (DOC)

Details
    • Training Objectives

      The objective of the training is to explain Unix security and the focus will be on non-network problems. The training will show the loopholes that are often missed by system administrators and discussions during training will be more on concepts and mechanisms to secure the system. This basic understanding can help system administrators to develop workable computer security policy.

      This training also discovers vulnerabilities and the many ways an intruder can manipulate a system. We will discuss on how to defend through proper configuration and present techniques to monitor network activities on a system.

      In addition, the training is also intended to assist system administrators in locating and using public domains to improve their system and network security. The course will emphasize on how to install, configure and use the security tools.

      The ultimate goal of the training is to give understandings of system and network problems encountered in Unix and how to secure Unix with proper installation, configuration and using effective security tools.

    • Who Should Attend

      These 4 days intensive training course in Unix System Administration Security training that features effective practices in securing Unix installations and administrations is intended for:


      • Unix System Administrators
      • Network Administrators
      • Computer Professionals
      • Others who need to know how to secure a UNIX system and network


    • Prerequisites

      You don't need to know anything about Unix security but, you will need to be familiar with Unix environment and commands in general. Basic knowledge in Unix administration and a minimum knowledge in C language would be a great help.

    • What the Training Will Be

      Throughout these 4 days training, you will learn and keep awareness of security issues in UNIX system. You will also identify your roles and responsibilities in securing your network and system and implement minimum security tools in your own environment.


    • What the Training Will Not Be

      The training will primarily discuss about Unix security issues. We will not explain and discuss issues on what is Unix, how to use Unix, and other issues which are not related to security.

    • Training Agenda

      Day 1 Overview
      UNIX Security
      UNIX File System
      System & Account Policies
      Day 2 Host Perimeter Defense
      Securing UNIX Common Application & Internet Services
      Day 3 Event & Log Monitoring
      Backup & Recovery Policies
      Host & Network Security Assesment
      Day 4 PGP
      Server Security Policy
      Remote Access Policy
      Securing Solaris: Step by Step
      Securing Linux : Step by Step

  • Training Contents

    Below are the topics that will be discussed in the training:


    • Overview
      This chapter discussed about UNIX history, pre installation and post installation process.

    • UNIX Security
      This chapter discussed about UNIX security line of defense, boot process and useful command that can use as security tools.

    • UNIX File System
      The chapter discussed about the UNIX files system (BSD, system V), file access control, mount command and file system configuration file.

    • System and Account Policies
      The chapter discussed about the system and account management of typical UNIX system on root and every user.

    • Host Perimeter Defense
      The chapter discussed about understanding and securing the hosts, important files to be monitor, network configuration file, Installation and usage of file integrity checker such as tripwire and AIDE, installation and usage of TCP wrappers. This chapter also involved a lot of practical works to be done by the student.

    • Securing UNIX common application and Internet Services
      The chapter discuss about vulnerability and securing the application such as telnet, ftp, WWW, sendmail and DNS. This chapter also introduces the alternative way by using openssh to replace telnet and ftp. In this chapter, there is lots of practical session involved.

    • Event and Log monitoring
      The discussion is base on UNIX logging mechanism, the usage and features available. The student also learns how to install and configure tools such as NTP and logcheck.

    • Backup, Recovery Policies
      The chapter discuss about backup and related matters such as methodology, backup policies and disaster recovery planning.

    • Host and network Security Assessment
      The chapter teaches the student how to do their own hosts security assessment. This student also introduced to security assessment tool such as nmap, SARA, tcpdump and ethereal.

    • Pretty Good Privacy (PGP)
      The chapter discussed about the big picture, installation and usage of the Pretty Good Privacy.

      Notes: The training contents are subject to change

  • Tentative Dates:

    Month Unix Training
    Aug 2003 26 - 29
    Oct 2003 7 - 10


  • Time:
    Monday - Thursday, 9.00am - 5.00pm
    Morning sessions run from 9.00am until 1.00pm.
    Afternoon sessions run from 2.00pm until 5.00pm

  • Venue:
    MIMOS Bhd, Technology Park Malaysia, Kuala Lumpur

  • Fee:
    The standard charge for this training is RM2500 per participant. However, the following groups/organizations are entitled discount as shown below:

    Categories of Organizations Discount Rates
    1) Corporate - 10% off for a group of 4 - 7 people
    - 15% off for a group of 8 or more people
    2) Government - 10% off for a group of 1 - 3 people
    - 20% off for a group of 4 - 7 people
    - 25% off for a group of 8 or more people
    3) Non-profit Organization - 5% off for a group of 1 - 3 people
    - 20% off for a group of 4 - 7 people
    - 30% off for a group of 8 or more people
    4) Students - 20% off for a group of 1 - 3 people
    - 30% off for a group of 4 - 7 people
    - 35% off for a group of 8 or more people
    5) Groups other than the above categories - 10% off for a group of 4 - 7 people
    - 15% off for a group of 8 or more people

    All payments should be made at least one (1) week prior to the training. All payments should be payable to MIMOS Berhad, by postal order or cheque. All rates are in Ringgit Malaysia (RM).

    (NOTE: Tea breaks and Lunch will be provided)

  • How To Register?
    • Email Registration:
      send email to with Subject: Unix System Administration Security Training
    • Fax Registration:
      Get the registration form by clicking here. Save the page to your computer and fill in the form. Our fax number is (6)
    • Online Registration:
      Will be available soon.

  • Contact Details

    For more information on this training program, please contact:

    NISER Training
    Email :
    Phone :
    Fax :




Disclaimers and copyright information
Last Update July 25, 2003