Course Overview

Your systems represent your business and your success. Without adequate attention, these precious resources place your business and customers at risk. You need to ensure that you know the security threat posed by rootkits in Linux. 

This course will help understand the different rootkits out there, and the threat they present. Monitoring your system is essential, and you will learn the tools available to you on a standard system as well as additional tools that can be added. During the course, you will learn tips that will help you secure and manage your system in the best possible way to mitigate the threat from cyber or internal attacks. 

By the end of this course, you’ll learn about rootkits and will be securing tour system preventing loss of your data and customers.

What You Will Learn

  • Learn to install rootkits.
  • Understand how to use rootkit detection tools.
  • Use aide system comparison tool.
  • Learn to secure Linux to prevent future attacks.
  • Develop a security policing and monitoring systems for compliance.

Program Curriculum

  • So, You’ve Been pwned!
  • Setting up the Lab
  • $7 Million Cybersecurity Scholarship by EC-Council
  • Chapter 1 Quiz

  • Gaining Initial Access to the System
  • Installing the Rootkit
  • Covering Your Tracks
  • Testing Access and Detectability
  • Chapter 2 Quiz

  • Relying on Detection Software can be False Security
  • Using unhide to Detect Rootkits
  • Using Rootkit Hunter to Detect Rootkits
  • Using chkrootkit to Detect Rootkits
  • Chapter 3 Quiz

  • Using System Logs to Monitor Activity
  • Using the Linux Audit Systems to Maintain Security
  • Using ausearch to Audit Activity
  • Monitoring System Changes with AIDE
  • Using AIDE in Linux
  • Chapter 4 Quiz

  • Identifying Weakness in Your Security Policy
  • Using Configuration Management to Enforce the Policy
  • Installing OpenSCAP
  • Installing Ansible
  • Creating the Security Playbook
  • Securing Your Estate
  • Chapter 5 Quiz
Load more modules

Instructor

Donald Tevault

Donald A. Tevault—but you can call him Donnie—got involved with Linux way back in 2006 and has been working with it ever since. He holds the Linux Professional Institute Level 3—Security certification, and the GIAC Incident Handler certification. Donnie is a professional Linux trainer, and thanks to the magic of the internet, teaches Linux classes globally from the comfort of his living room. He's also a Linux security researcher for an IoT security company.

Join over 1 Million professionals from the most renowned Companies in the world!

certificate

Empower Your Learning with Our Flexible Plans

Invest in your future with our flexible subscription plans. Whether you're just starting out or looking to enhance your expertise, there's a plan tailored to meet your needs. Gain access to in-demand skills and courses for your continuous learning needs.

Monthly Plans
Annual Plans
Save 20% with our annual plans!

Pro

Ideal for continuous learning, offering extensive resources with 600+ courses and diverse Learning Paths to enhance your skills.

$ 499.00
Billed annually or $59.00 billed monthly

What is included

  • 700+ Premium Short Courses
  • 50+ Structured Learning Paths
  • Validation of Completion with all courses and learning paths
  • New Courses added every month
Early Access Offer

Pro +

Experience immersive learning with Practice Labs, CTF Challenges, and exclusive EC-Council certifications for comprehensive skill-building.

$ 599.00
Billed annually or $69.00 billed monthly

Everything in Pro and

  • 800+ Practice Lab exercises with guided instructions
  • 150+ CTF Challenges with detailed walkthroughs
  • New Practice Labs and Challenges added every month
  • 3 Official EC-Council Essentials Certifications¹ (retails at $897!)
    Exclusive Bonus with Annual Plans

¹This plan includes Digital Forensics Essentials (DFE), Ethical Hacking Essentials (EHE), and Network Defense Essentials (NDE) certifications. No other EC-Council certifications are included.

Related Courses

1 of 8