Deze pagina is niet beschikbaar in het Nederlands. Gelieve ons hiervoor te verontschuldigen.

Linux advanced performance and security

This four-day course dives deeply in Linux Performance Tuning, explains how to optimise your systems and build high-performance best practices. It explains which tools and how to best analyse performance related problems and how to build Linux clusters. It continues with an extensive look in the most important security tools and methods to harden your Linux infrastructure. 

At the end of the course, the students will understand Linux better, in following domains :

  • Performance Tuning Concepts
  • Performance Tuning Tools
  • Understand important misconceptions related with performance tuning
  • Kernel Tuning
  • Understand best practices
  • Gains working experience with clustering architectures
  • Can apply clustering with LVM and Ultramonkey
  • Virtualisation
  • Understands the different angles involved with hardening of a system
  • Gains working experience with file integrity checkers and different implementations
  • Understands the concept of openssh proxy-ing
  • Becomes experienced with tools such as nmap, iptables and many more...
  • Is able to set up the Snort Intrusion Detection System with it''s web interface ACID and mySQL backend

Schedule a training?

On demand course

BEDRIJFSOPLEIDING AANVRAGEN

 

Publieke opleidingskalender

Momenteel zijn er voor deze cursus geen publieke sessies gepland. Graag organiseren we een bedrijfssessie voor u of een extra publieke sessie (bij voldoende belangstelling). Geïnteresseerd? Laat het ons weten.

Intended for

Linux System Administrators with at least one year of operational experience and a good understanding how Linux works

Background

At least 3 years of working experience as a Linux system administrator

Main topics

Section 1

  • Performance Tuning Concepts
  • Performance Tuning Tools
  • Kernel Tuning
  • Advanced Software RAID

Section 2

  • Setting up iSCSI initiator and target on software RAID
  • Best Practices (Web, Filesharing, Databases,...)
  • Clustering Architectures
  • Clustering and quorum management
  • Virtualisation

Section 3

  • Using clustered filesystems such as ocfs2 and gfs2
  • Playing with clustering
  • Linux Security Overview

Section 4

  • Security from all angles (Tripwire/AIDE/Osiris/Samhein, iptables, ssh wizardry, PAM)
  • Security from all angles continued (sudo recipes, openssh, gnuPG, nmap,....)
  • Snort Intrusion Detection System

Training method

Classical education with exercises in a workshop atmosphere

Certificate

At the end of the session, the participant receives a 'Certificate of Completion'.

Duration

4 days.

Course leader

Linux Belgium.


SESSIE-INFO EN INSCHRIJVEN