This course is an introduction to the securing of Linux platforms and applications. Areas of study include identifying and examining methods of securing Linux platforms and applications and implementing those methods.
- ENG 101: English Composition 1
- ENG 102: English Composition 2
- ITE 145: Fundamentals of Information Systems Security
- ITE 220: Networking and Data Communcation (Recommended)
Student Learning Outcomes (SLOs)
Students who successfully complete this course will be able to:
- Identify threats to the Linux operating system and other open source applications.
- Describe components of Linux security.
- Lock down the Linux boot process.
- Explain user account management and the principle of least privilege to protect and secure the system and its data.
- Examine the flexibility of various options with file permissions and filesystem settings and how granular control isolates data access.
- Describe vulnerabilities in Linux services and the appropriate steps to mitigate the risks.
- Assess how firewall, Transmission Control Protocol (TCP) Wrappers, and SELinux complement one another to secure network applications.
- Describe Linux file-sharing and remote access solutions.
- Describe how to secure Web services, applications, and access.
- Assess the architecture of the Linux kernel and techniques used to enact a more secure kernel.
- Evaluate the importance of maintaining a software management plan.
- Establish a system baseline to detect anomalies.
- Test and gather security reports.
- Analyze best practices to respond and recover from a security breach (incident).
- Describe best practices for keeping Linux up to date and future changes to Linux security.
General Education Outcomes (GEOs)
Course Activities and Grading
Discussions (Weeks 1-8)
Final Exam (Week 8)
(Available through our online bookstore)
- Jang, Michael. Security Strategies in Linux Platforms and Applications - with Access Code. 2nd ed. Sudbury, MA: Jones & Bartlett, 2017. ISBN-13: 9781284159646
Note: This is a bundle which includes the textbook and the Access Code required for this course. Student must purchase these materials “New” from the Charter Oak State College bookstore. Used materials or materials from any other source are not acceptable.
Readings and Exercises
Topics: Linux Security Basics, Core Components, and Distributions
Topics: User Permissions, Filesystems, and Encryption
Topic: Securing Services
Topics: Networks, Firewalls, and Remote Access
Topics: Application and Kernel Security
Topics: Managing Security Alerts and Updates
Topics: Security Baselines, Logging, Testing, and Reporting
Topics: Detecting and Responding to Security Breaches
COSC Accessibility Statement
Charter Oak State College encourages students with disabilities, including non-visible disabilities such as chronic diseases, learning disabilities, head injury, attention deficit/hyperactive disorder, or psychiatric disabilities, to discuss appropriate accommodations with the Office of Accessibility Services at OAS@charteroak.edu.
COSC Policies, Course Policies, Academic Support Services and Resources
Students are responsible for knowing all Charter Oak State College (COSC) institutional policies, course-specific policies, procedures, and available academic support services and resources. Please see COSC Policies for COSC institutional policies, and see also specific policies related to this course. See COSC Resources for information regarding available academic support services and resources.