In this course you will learn how to assess security risks in your enterprise Linux environment, the best techniques and tools to increase security, server hardening, how to deploy and use monitoring and attack detection tools, how to gain visibility into possible vulnerabilities, the art and science of developing your Linux security policy and response strategy, how to configure your systems for compliance with HIPAA, DISA STIG, etc., and more.
This course is for individuals already experienced in Linux system administration who want to improve their security posture. Before enrolling, you should have a solid understanding of core local system administration and networking concepts, and be experienced with Linux (or more generally UNIX), especially at the command line level.
The key to a successful open technology project is to ensure a neutral playing field for all developers, technologists, and companies to collectively contribute to project evolution and growth. The Linux Foundation was built on the idea of the democratization of code and scaling adoption, for all projects equally. Expert legal and governance support programs ensure everyone is on the same playing field.