What is Linux?

Linux is a Unix-type operating system Before Unix, there was Multics Dennis Ritchie’s “Unics” PDP7 Ritchie and Brian Kernighan invented C, and with Ken Thompson largely originated Unix The effort outgrew U Cal Berkeley and was taken over by AT&T Which gave rise to commercial Unices (Unixes or *nix) Richard Stallman made the technical, political …

Linux Fundamentals

UNM Continuing Education Course Instructor: Glenn Norman Text: Objectives A basic understanding of working in Linux Familiarity with construction, maintenance and troubleshooting of Linux systems Beginning preparation to pass the CompTIA Linux+ Certification Exam

Security+ Security Tools

My Favorite Free Security Tools Command-Line Tools Command Description Example Explanation Linux dig Queries DNS servers for host name/IP address mappings. dig dig <hostname> Queries hosts listed in /etc/resolve.conf or the host named. ping Requests a response from a host. Keeps going until Ctrl-C. ping google.com Asks the computer handling requests for google.com for a …

6.0 Cryptography

Domain 6.0 Cryptography – 11%   Symmetric Cyphers Type Block or Stream Key Rounds Details DES 64 bit block 56 bit 16 Used in the electronic payment industry. 3DES/TDES/3TDES 64 bit block 56 bit 16 x 3 different keys TDES is used in commercial data transfers. AES (Rijndael – “Rhine doll”) 128 bit block 128/192/256 …

5.0 Access Control and Identity Management

Domain 5.0 Access Control and Identity Management – 13% Authentication, Access Control & Auditing Know For The Security+ Test: The three “pillars” or “foundations” of information security are Authentication, Access Control and Auditing. (The mnemonic “AAA” may help you remember.) Authentication: By What You Know – A password, PIN, or mother’s maiden name By What …

1.0 Network Security

Domain 1.0 Network Security – 21% Hardening networks: Firmware upgrades Computers, routers and other network equipment store fixed firmware in ROM modules, including: Erasable Programmable Read-Only Memory (EPROM) Electronically Erasable Programmable Read-Only Memory (EEPROM) Computer manufacturers (such as Dell), chipset manufacturers (such as Intel) and router manufacturers (such as Cisco) frequently issue firmware updates. The …

4.0 Application, Data and Host Security

Domain 4.0 – Application, Data and Host Security – 16% System Security is our initial set of best practices. It includes: Disabling non-essential systems and services Hardening operating systems by Applying updates and Securing file systems Hardening applications by Hardening servers (daemons or services) and Hardening data stores Hardening networks through Firmware upgrades and Secure …