Linux advanced performance and security
This four-day course dives deeply in Linux Performance Tuning, explains how to optimise your systems and build high-performance best practices. It explains which tools and how to best analyse performance related problems and how to build Linux clusters. It continues with an extensive look in the most important security tools and methods to harden your Linux infrastructure.
At the end of the course, the students will understand Linux better, in following domains :
- Performance Tuning Concepts
- Performance Tuning Tools
- Understand important misconceptions related with performance tuning
- Kernel Tuning
- Understand best practices
- Gains working experience with clustering architectures
- Can apply clustering with LVM and Ultramonkey
- Virtualisation
- Understands the different angles involved with hardening of a system
- Gains working experience with file integrity checkers and different implementations
- Understands the concept of openssh proxy-ing
- Becomes experienced with tools such as nmap, iptables and many more...
- Is able to set up the Snort Intrusion Detection System with it''s web interface ACID and mySQL backend
Schedule a training?
On demand course
BEDRIJFSOPLEIDING AANVRAGEN |
Publieke opleidingskalender
Momenteel zijn er voor deze cursus geen publieke sessies gepland. Graag organiseren we een bedrijfssessie voor u of een extra publieke sessie (bij voldoende belangstelling). Geïnteresseerd? Laat het ons weten.
Intended for
Linux System Administrators with at least one year of operational experience and a good understanding how Linux works
Background
At least 3 years of working experience as a Linux system administrator
Main topics
Section 1
- Performance Tuning Concepts
- Performance Tuning Tools
- Kernel Tuning
- Advanced Software RAID
Section 2
- Setting up iSCSI initiator and target on software RAID
- Best Practices (Web, Filesharing, Databases,...)
- Clustering Architectures
- Clustering and quorum management
- Virtualisation
Section 3
- Using clustered filesystems such as ocfs2 and gfs2
- Playing with clustering
- Linux Security Overview
Section 4
- Security from all angles (Tripwire/AIDE/Osiris/Samhein, iptables, ssh wizardry, PAM)
- Security from all angles continued (sudo recipes, openssh, gnuPG, nmap,....)
- Snort Intrusion Detection System
Training method
Classical education with exercises in a workshop atmosphere
Certificate
At the end of the session, the participant receives a 'Certificate of Completion'.
Duration
4 days.
Course leader
Linux Belgium.
SESSIE-INFO EN INSCHRIJVEN |