13.05.2024
LPI 303 Security
Vorbereitung auf die LPI Prüfung 303
| Format | Topic | Progress |
|---|---|---|
| 332.1 Host Hardening (weight: 5) |
|
|
| 332.2 Host Intrusion Detection (weight: 5) |
|
|
| 332.3 Resource Control (weight: 3) |
|
| Format | Topic | Progress |
|---|---|---|
| 333.1 Discretionary Access Control (weight: 3) |
|
|
| 333.2 Mandatory Access Control (weight: 5) |
|
| Format | Topic | Progress |
|---|---|---|
| 334.1 Network Hardening (weight: 4) |
|
|
| 334.2 Network Intrusion Detection (weight: 4) |
|
|
| 334.3 Packet Filtering (weight: 5) |
|
|
| 334.4 Virtual Private Networks (weight: 4) |
|
| Format | Topic | Progress |
|---|---|---|
| 335.1 Common Security Vulnerabilities and Threats (weight: 2) |
|
|
| 335.2 Penetration Testing (weight: 3) |
|
Description
Candidates understand the concepts of penetration testing, including an understand of commonly used penetration testing tools. Furthermore, candidates should be able to use nmap to verify the effectiveness of network security measures.
Key Knowledge Areas:
Partial list of the used files, terms and utilities:
Description
Candidates should understand the principle of major types of security vulnerabilities and threats.
Key Knowledge Areas:
The following is a partial list of the used files, terms and utilities:
…
Description
Candidates should be familiar with the use of OpenVPN, IPsec and WireGuard to set up remote access and site to site VPNs.
Key Knowledge Areas:
Partial list of the used files, terms and utilities:
…
Description
Candidates should be familiar with the use and configuration of the netfilter Linux packet filter.
Key Knowledge Areas:
Partial list of the used files, terms and utilities:
…
Description
Candidates should be familiar with the use and configuration of network security scanning, network monitoring and network intrusion detection software. This includes updating and maintaining the security scanners.
Key Knowledge Areas:
Partial list of the used files, terms and utilities:
…
Description
Candidates should be able to secure networks against common threats. This includes analyzing network traffic of specific nodes and protocols.
Key Knowledge Areas:
The following is a partial list of the used files, terms and utilities:
Description
Candidates should be familiar with mandatory access control (MAC) systems for Linux. Specifically, candidates should have a thorough knowledge of SELinux. Also, candidates should be aware of other mandatory access control systems for Linux. This includes major features of these systems but not configuration and use.
Key Knowledge Areas:
Partial list of the used files, terms and utilities:
…
Description
Candidates should understand discretionary access control (DAC) and know how to implement it using access control lists (ACL). Additionally, candidates are required to understand and know how to use extended attributes.
Key Knowledge Areas:
Partial list of the used files, terms and utilities:
…
Description
Candidates should be able to restrict the resources services and programs can consume.
Key Knowledge Areas:
Partial list of the used files, terms and utilities:
…
Description
Candidates should be familiar with the use and configuration of common host intrusion detection software. This includes managing the Linux Audit system and verifying a system’s integrity.
Key Knowledge Areas:
Partial list of the used files, terms and utilities:
…
Description
Candidates should be able to secure computers running Linux against common threats.
Key Knowledge Areas:
The following is a partial list of the used files, terms and utilities:
…
Description
Candidates should have experience and knowledge of cryptography in the context of DNS and its implementation using BIND. The version of BIND covered is 9.7 or higher.
Key Knowledge Areas:
and NSEC3PARAM
Partial list of the used files, terms and utilities:
…
Description
Candidates should be able to set up and configure encrypted file systems.
Key Knowledge Areas:
The following is a partial list of the used files, terms and utilities:
…
Description
Candidates should be able to use X.509 certificates for both server and client authentication. This includes implementing user and server authentication for Apache HTTPD. The version of Apache HTTPD covered is 2.4 or higher.
Key Knowledge Areas:
Partial list of the used files, terms and utilities:
…
Description
Candidates should understand X.509 certificates and public key infrastructures. They should know how to configure and use OpenSSL to implement certification authorities and issue SSL certificates for various purposes.
Key Knowledge Areas:
Partial list of the used files, terms and utilities:
…