bluepoint.foundation

bluepoint.foundation

Linux® Network Security

Bluepoint generates funds for its various Open Source advocacy and development projects through public course offerings. Our continuing education programs provide advanced and comprehensive training in Linux and Open Source.

Qualified applicants enjoy quality course content, certified and highly competent instructors, credits toward Bluepoint Certified PHP Developer™ (CPD) and Bluepoint Open Network Engineer™ (ONE) certifications, and subsidized training fees.

courseLINUX NETWORK SECURITY
duration18 hours
focusLinux system and network security
prerequisitesLinux Express® or equivalent experience
distributionsFedora and CentOS
credit towards certificationN/A
investmentPHP 14,950.00 NON-VAT
early birdPHP 14,202.50 NON-VAT


Linux® is an Open Source, full-featured, powerful and robust UNIX-like operating system based on the initial work of Linus Torvalds from the University of Helsinki in Finland. Since 1991, his work was extended and ported to many platforms by a worldwide community of software developers. Today it runs everything from embedded systems to nuclear submarines. Linux also powers Wall Street, the London Stock Exchange, the CERN supercollider, and NASA's supercomputers.


COURSE DESCRIPTION

Gain an understanding of how intruders and hackers think when attacking networks through real world examples and demonstrations. Learn how to minimize vulnerabilities and build strategies against attackers. Effectively evaluate network security and implement security best practices. All in 3 days!


COURSE OUTLINE

I. Introduction to Networking

II. Ethics and Hacking

III. Types of Attacks
Foot Printing
Scanning
Enumeration
System Hacking
Trojans and Backdoors
Sniffers
Denial of Service
Social Engineering
Session Hijacking
Web Application Vulnerabilities
Web Based Password Cracking Techniques
SQL Injection
Hacking Wireless Networks
Viruses
Buffer Overflows

IV. Protection and Prevention
Cryptography
Firewalls
Intrusion Detection Systems
Honey Pots
Honey Nets
Vulnerability Assessment
Penetration Testing



ATTRIBUTION

The registered trademark Linux® is used pursuant to a sublicense from Linux Mark Institute, the exclusive licensee of Linus Torvalds, owner of the mark on a world-wide basis. Fedora and CentOS are trademarks of Red Hat, Inc.
training

Comments

R
Roland Reuel Salamatin
Wednesday, 14 January 2009, 5:00 AM
146 words, 44-second read
I was introduced by my friend Mark Mercado from TIP to the Linux Network Security program. He was all positive about his experiences attending technical trainings from Bluepoint that I was very convinced to register for this training as well.

There in the training I met Mr. Engels Antonio, a very cool down to earth uber techie guy who also happens to be the first RHCX in the Philippines! And since he has so much expertise on Linux and security, the sessions were jam-packed with learning and hands-on knowledge that I feel more confident on how to properly secure Linux systems. The lectures were well organized, highlighting how hackers think and break into our systems and how we can effectively defend against their attacks.

I'm definitely looking forward to attending more seminars and activities. And I'm proud to be a Bluepoint alumni!
M
Mark Gil Mercado
Friday, 16 January 2009, 3:38 AM
169 words, 51-second read
I already passed the EC-Council's Certified Ethical Hacker exam but I still rushed to file a reservation when I heard that Bluepoint was opening a Linux Network Security Crash Course. The course was jam-packed with new knowledge; I was never wrong when I thought that this course will put my security skills to the next level.

The course content is heavy and the approach is remarkable; it did not focus on how to use hacking tools but instead it concentrated, in a comprehensive manner, on how the REAL hackers, not just the script kiddies, compromise a target and how to build a defense for it. Mastery of the subject matter is very evident with the instructor, Engels Antonio, whose own dealings with hackers were shared, that spiced up the discussion more.

For me, this course is a must for people in charge of security. What I learned here exceeded my expectations.

Mark Gil Mercado
Technological Institute of the Philippines
J
Jojo Babas
Monday, 16 March 2009, 6:45 AM
195 words, 59-second read
The Internet is a wonderful tool, but the reality is that it's a hostile environment. There are a lot of characters out there trying to cause mischief and the Internet provides a vast playground. In this day and age, security plays a very important role in a system administrator's life, and it seems not enough to just put up firewalls and other security measures, it's also important to know how these characters think so that you'll always be a step ahead of whatever they plan to do next.

The instant I learned that Bluepoint was going to give out crash courses on Network Security, I did not hesitate to reserve a slot, I knew that I had to be a part of it. As expected, sessions were overflowing with information and were spiced up with personal experiences. Discussions were very rich; unfortunately the only limiting factor was time. Hopefully, this would be addressed on other future sessions.

The few days I spent on these Network Security crash courses were indeed a very rich and rewarding experience. I eagerly wait for the next series of courses Bluepoint is going to offer.