Upon successful completion of this subject students should be able to:
* install and use encryption software * maintain user accounts and passwords * implement and use public key infrastructures * identify and disable unused system services * audit the security of a Linux system * enable and use wrappers and proxies * maintain file permissions and access control lists * implement and maintain manditory access controls * setup, maintain and monitor system logs * configure a Linux firewall * setup intrusion prevention and detection systems * monitor and restrict logins * install, configure and administrate authentication schemes
=== Topic Outline ===