SCN GmbH

Forcepoint Threat Protection for Linux

Seminar / Training Forcepoint Threat Protection for Linux

Linux administration - Linux security challenges - History of successful exploits - Protection of Linux operating system at different - levels

Memory forensics - Extracting IPs, ports from memory - Garbage dumps - Process-related data structures - Non-default kernel modules

Linux requirements for deployment - Threat protection for Linux - Package formats (RPM, DEB) - SSH with client certificate - Sudo and forced commands - Kernel module management - System log and removal rate - Restricting - Task setting with crontab

Product architecture - Software components and interactions - Kernel module pmad.ko - Reference databases - SIEM and Splunk

Reporting and Splunk - Configuration management tools - Ansible - Cfengine, Salt - Puppet - Chef

Endpoint configurations - Analyzing the full dump - Creating partial queries - Dealing with "blurry" memory images

Command line tools explained - secondlook-cli - secondlook-scan - secondlook-gui

Alert filtering - Regex for alert descriptions

SIEM and Splunk - Collecting data; SIEM and syslogd - Splunk data sources - Splunk queries and dashboards - Integration with GreyLog, ArcSight, QRadar, Datalog, Sumologic

Setting up reference database - Configuring DB, users and permissions

Adding new software to the reference database - Overview of deb, rpm packages - ELF format - Sizing and caching considerations - Secondlook_scan.cfg and URL

Adding new kernel images - Inspecting ZRK files - Creating new reference ZRKs - Adding ZRKs to local reference

Filter warnings - Regex patterns with warning messages - Typical warning examples

Testing - Unrecognized user processes- Non-ELF executable mappings - Experiments with modified longring - Software - Additional drivers - JIT compilation

Promiscuous NICs, pre-linking - VMware tools as false positives - NIC configuration causing warnings - Pre-linking (CentOS and other distributions)

Unrecognized kernel modules - Credential reuse for kernel tasks - Hook kernel data structures

Rootkit discussion - "Average coder" rootkit - Phalanx 2" rootkit - "Suterusu" rootkit

We conduct this seminar online for you. You can book the training as a public seminar or as a company seminar. The practical exercises are carried out in our Remotelab and make up 40-50 percent of the seminar.

Your contacts

We offer seminars with a high practical relevance. The contents and exercises are geared to your daily tasks in the company and completely dispense with advertising references to other products of the software manufacturer.

All our training courses are manufacturer-independent. This enables us to offer critical considerations of the products themselves and comparisons with competitors of the manufacturer in the seminar. The course contents are our own and derived from the practical experience of our trainers in projects.

Of course, the contents of company seminars can be individually adapted to your needs. Please do not hesitate to contact us.

Réservation


Das Seminar wurde auf die Merkliste gesetzt


Das von Ihnen gewählte Seminar wurde bereits auf die Merkliste gesetzt


Bitte wählen Sie einen freien Termin aus


Bitte geben Sie Ihren Wunschtermin im Format tt.mm.jjjj ein


Bitte wählen Sie einen freien Termin aus


Bitte geben Sie den gewünschten Termin im Format tt.mm.jjjj der Schulung ein

Duration 3 Days, approx. 6h/Day
1. Day: 10:00 Clock, more from 09:00 Clock
Price ₦ 948.707,00 plus VAT.
Seminar documents Original documentation of the manufacturer on data carrier / download / weblink
Certificate of attendance yes, of course
Barrier free access Available at most locations
Catering Cold / hot drinks, lunch (optional vegetarian) - not for company and online seminars
Support 3 calls included in the seminar price
Methods Lecture, demonstration, practical exercises on the system
Seminar types With trainer on site: Public or in-house - Alternatively orderable as webinar
Implementation guarantee yes, from 2 participants, max. 8 participants, Details

Choose a free date for Aba


















Duration 3 Days, approx. 6h/Tag
1. Day: 10:00 Clock, more from 09:00 Clock
Price ₦ 2.484.710,00 plus VAT.
Seminar documents Original documentation of the manufacturer on data carrier / download / weblink
Certificate of attendance yes, of course
Barrier free access Available at most locations
Catering Cold / hot drinks, lunch (optional vegetarian) - not for company and online seminars
Support 3 calls included in the seminar price
Methods Lecture, demonstration, practical exercises on the system
Seminar types With trainer on site: Public or in-house - Alternatively orderable as webinar
Implementation guarantee yes, from 2 participants, max. 8 participants, Details

Enter your preferred date for Aba



Duration 3 Days, approx. 6h/Tag
1. Day: 10:00 Clock, more from 09:00 Clock
Price ₦ 948.707,00 plus VAT.
Seminar documents Original documentation of the manufacturer on data carrier / download / weblink
Certificate of attendance yes, of course
Barrier free access Available at most locations
Catering Cold / hot drinks, lunch (optional vegetarian) - not for company and online seminars
Support 3 calls included in the seminar price
Methods Lecture, demonstration, practical exercises on the system
Seminar types With trainer on site: Public or in-house - Alternatively orderable as webinar
Implementation guarantee yes, from 2 participants, max. 8 participants, Details

Please select a free date