Visão Geral
O Curso Linux Essentials for Cybersecurity foi desenvolvido para fornecer aos participantes uma base sólida em Linux com foco específico em segurança da informação. Durante o curso, os alunos aprenderão a configurar, administrar e proteger sistemas Linux, utilizando as principais ferramentas e práticas empregadas por profissionais de segurança cibernética.
Além de dominar comandos essenciais, os participantes compreenderão como identificar vulnerabilidades, aplicar hardening e monitorar atividades suspeitas em ambientes baseados em Linux.
Conteúdo Programatico
Módulo 1: Introduction to Linux and Cybersecurity
- Overview of Linux in cybersecurity environments
- Linux distributions commonly used for security (Ubuntu, Kali, CentOS)
- Understanding the Linux file system hierarchy
- The role of Linux in servers, cloud, and penetration testing
Módulo 2: Command Line Fundamentals
- Navigating the file system using shell commands
- File manipulation and permissions
- Working with text files and log files
- User and group management
- Using
sudo
and privilege escalation basics
Módulo 3: File Permissions and Security Basics
- Understanding Linux file permissions (rwx)
- Managing ownership and groups
- Using
chmod
, chown
, and chgrp
- Implementing least privilege and user restrictions
Módulo 4: System and Network Configuration
- Managing services and processes
- Configuring network interfaces and firewall rules
- Introduction to
iptables
and ufw
- System logging and monitoring with
journalctl
and syslog
Módulo 5: Linux Hardening Techniques
- Disabling unused services
- Configuring SSH securely
- Managing updates and patches
- Implementing password policies and auditing login attempts
Módulo 6: Security Tools and Utilities
- Basic use of security tools (Nmap, Netstat, Tcpdump)
- File integrity verification (Tripwire, AIDE)
- Monitoring users and detecting intrusions
- Managing permissions with SELinux and AppArmor (overview)
Módulo 7: Practical Scenarios and Incident Response
- Analyzing logs for suspicious activities
- Responding to security incidents on Linux
- Backups and recovery strategies
- Case studies and hands-on lab exercises
Módulo 8: Final Project and Best Practices
- Applying Linux security configurations to a simulated environment
- Hardening a Linux server from scratch
- Implementing auditing and reporting
- Best practices for ongoing security management