Course Description
This course will focus on the securing of Linux platforms and applications. Areas of study include identifying and examining methods of securing Linux platforms and applications and implementing those methods. (3 credits)
Prerequisites
- ENG 101: English Composition 1
- ENG 102: English Composition 2
- ITE 145: Fundamentals of Information Systems Security OR CSS 101 Cybersecurity Fundamentals
- ITE 220: Networking and Data Communcation (Recommended)
Student Learning Outcomes (SLOs)
Students who successfully complete this course will be able to:
- Identify threats to the Linux operating system and other open source applications.
- Describe components of Linux security.
- Lock down the Linux boot process.
- Explain user account management and the principle of least privilege to protect and secure the system and its data.
- Examine the flexibility of various options with file permissions and filesystem settings and how granular control isolates data access.
- Describe vulnerabilities in Linux services and the appropriate steps to mitigate the risks.
- Assess how firewall, Transmission Control Protocol (TCP) Wrappers, and SELinux complement one another to secure network applications.
- Describe Linux file-sharing and remote access solutions.
- Describe how to secure Web services, applications, and access.
- Assess the architecture of the Linux kernel and techniques used to enact a more secure kernel.
- Evaluate the importance of maintaining a software management plan.
- Establish a system baseline to detect anomalies.
- Test and gather security reports.
- Analyze best practices to respond and recover from a security breach (incident).
- Describe best practices for keeping Linux up to date and future changes to Linux security.
Course Activities and Grading
Assignments | Weight |
---|---|
Discussions (Weeks 1-3, 5 & 7) | 15% |
Lab Assignments | 20% |
Project | 40% |
Final Exam (Week 8) | 25% |
Total | 100% |
Required Textbooks
Available through Charter Oak State College's Book Bundle
- Jang, Michael. Security Strategies in Linux Platforms and Applications - with Access Code. 2nd ed. Sudbury, MA: Jones & Bartlett, 2017. ISBN-10: 1-284-15964-7 or ISBN-13: 978-1-284-15964-6
- Note: This is a bundle which includes the textbook and the Access Code required for this course. We discourage students from purchasing “used” materials from other sources due to access codes not working properly.
Course Schedule
Week | SLOs | Readings and Exercises | Assignments |
1 | 1,2,3 | Topics: Linux Security Basics, Core Components, and Distributions
|
|
2 | 4,5,6 | Topics: User Permissions, Filesystems, and Encryption
|
|
3 | 7,8 | Topic: Securing Services
|
|
4 | 9,10 | Topics: Networks, Firewalls, and Remote Access
|
|
5 | 11 | Topics: Application and Kernel Security
|
|
6 | 12,13 | Topics: Managing Security Alerts and Updates
|
|
7 | 14,15 | Topics: Security Baselines, Logging, Testing, and Reporting
|
|
8 | 1-15 | Topics: Detecting and Responding to Security Breaches
|
|
COSC Accessibility Statement
Charter Oak State College encourages students with disabilities, including non-visible disabilities such as chronic diseases, learning disabilities, head injury, attention deficit/hyperactive disorder, or psychiatric disabilities, to discuss appropriate accommodations with the Office of Accessibility Services at OAS@charteroak.edu.
COSC Policies, Course Policies, Academic Support Services and Resources
Students are responsible for knowing all Charter Oak State College (COSC) institutional policies, course-specific policies, procedures, and available academic support services and resources. Please see COSC Policies for COSC institutional policies, and see also specific policies related to this course. See COSC Resources for information regarding available academic support services and resources.