GET TRAINED GET CERTIFIED GET PLACED. Certified Linux & Security Professionals in High Demand Globally MASK365 KNOWLEDGE CENTRE

16  Download (0)

Full text

(1)

MASK365™

KNOWLEDGE CENTRE

GET TRAINED | GET CERTIFIED | GET PLACED

Certified Linux & Security Professionals in

High Demand Globally

CERTIFIED

TRAINING PARTNER

(2)

OUR GOAL

To Provide quality training and platform for aspiring students, through

globally recognised Trainings & Certifications from Red Hat and

EC-Council with the help of what we have learned through our Knowledge

& Experience.

ABOUT MASK365™ KNOWLEDGE CENTRE

MASK365™ Knowledge Centre is an initiative of Pisces Solutions Private Limited.

Pisces Solutions was founded in 2002 as an IT Consulting firm in the field of

Networking Solutions and Cyber Security. It has implemented various projects in

India, Middle East & China entirely based on Linux as a Platform. Pisces Solutions

became a Private Limited company in 2014 and stepped into education in 2015

by becoming Red Hat Certified Training Partner and EC-Council Accredited

Training Centre under the name of MASK365™ Knowledge Centre. Pisces

Solutions Private Limited is also the founder and creator of a MASK365™-UTM, a

leading Firewall, Content Filtering and Security Appliance.

ABOUT THE TRAINER

(3)

TRAINING AND CERTIFICATION

(4)

RED HAT CERTIFIED SYSTEM ADMINISTRATOR [RHCSA]

An IT professional who has earned the Red Hat Certified System Administrator (RHCSA) is able to perform the core system administration skills required in Red Hat Enterprise Linux environments. The credential is earned after successfully passing the Red Hat Certified System Administrator (RHCSA) Exam (EX200).

COURSE OVERVIEW - PART I

• Access the command line

• Manage files from the command line • Get help in Red Hat Enterprise Linux • Create, view, and edit text files • Manage local Linux users and groups

• Control access to files with Linux file system permissions • Monitor and manage Linux processes

• Control services and daemons

• Configure and secure OpenSSH service • Analyze and store logs

• Manage Red Hat Enterprise Linux networking • Archive and copy files between systems • Install and update software packages • Access Linux file systems

• Use virtualized systems

COURSE OVERVIEW - PART II

• Automate installation with Kickstart • Use regular expressions with grep • Create and Edit text files with vim • Schedule future Linux tasks • Manage priority of Linux processes

• Control access to files with access control lists (ACL) • Manage SELinux security

• Connect to network-defined users and groups

• Add disks, partitions, and file systems to a Linux system • Manage logical volume management (LVM) storage

• Access networked attached storage with network file system (NFS) • Access networked storage with SMB

• Control and troubleshoot the Red Hat Enterprise Linux boot process • Limit network communication with firewall

• Comprehensive review

PREREQUISITES FOR THIS COURSE

There are no formal prerequisites for this course; however, previous operating system administration experience will be very beneficial.

(5)

RED HAT CERTIFIED ENGINEER [RHCE]

A Red Hat Certified Engineer (RHCE) is a Red Hat Certified System Administrator (RHCSA) who possesses the additional skills, knowledge, and abilities required of a senior system administrator responsible for Red Hat Enterprise Linux systems.

The course is focused on deploying and managing network servers running caching Domain Name Service (DNS), MariaDB, Apache HTTPD, Postfix SMTP nullclients, network file sharing with Network File System (NFS) and Server Message Block (SMB), iSCSI initiators and targets, advanced networking and firewalld configurations, and the use of Bash shell scripting to help automate, configure, and troubleshoot the system. Through lectures and hands-on labs, students who have already earned the RHCSA certification will be exposed to all competencies covered by the Red Hat Certified Engineer (RHCE) exam (EX300).

AN RHCE IS CAPABLE OF RHCSA TASKS PLUS THE FOLLOWING:

• Configuring static routes, packet filtering, and network address translation • Setting kernel runtime parameters

• Configuring an Internet Small Computer System Interface (iSCSI) initiator • Producing and delivering reports on system utilization

• Using shell scripting to automate system maintenance tasks • Configuring system logging, including remote logging

• Configuring a system to provide networking services, including HTTP/HTTPS, File Transfer Protocol (FTP), network file system (NFS), server message block (SMB), Simple Mail Transfer Protocol (SMTP), secure shell (SSH) and Network Time Protocol (NTP)

COURSE OVERVIEW

• Control services and daemons • Manage IPv6 networking

• Configure link aggregation and bridging • Control network port security

• Manage DNS for servers • Configure email delivery

• Provide block-based storage (iSCSI) • Provide file-based storage (NFS / SMB) • Configure MariaDB databases

• Provide Apache HTTPD web service • Write Bash scripts

• Bash conditionals and control structures • Configure the shell environment • Linux containers preview (Docker) • Comprehensive review

PREREQUISITES FOR THIS COURSE:

RHCSA certification or equivalent experience

(6)

RED HAT LINUX TROUBLESHOOTING (RH242)

In Red Hat® Linux® Troubleshooting (RH242), system administrators will learn techniques for troubleshooting a Linux system and how to use the troubleshooting tools available on Red Hat Enterprise Linux 6.

COURSE OVERVIEW

This course relates to Red Hat Enterprise Linux 6. It is a heavily lab-oriented class designed to help the student learn or improve troubleshooting skills. Students will gain troubleshooting experience by debugging live, virtualized systems.

OUTLINE FOR THIS COURSE

• Proactively monitor log files, hardware, file systems, and system and network performance • Several approaches to managing configuration changes and developing a recovery plan • An introduction to troubleshooting methods, best practices, and tools

• Booting Issues, Use recovery runlevels and rescue mode; work with advanced GRUB features

• Hardware Issues, Preempting hardware failures (looking for the signs); protecting against hardware failures; redundant configurations; tools to help identify hardware failures and intermittent problems

• File System Issues, Locate unauthorized changes; audit software; file system tuning and repair; file recovery • Disk Issues, Rescuing LVM volumes; maintenance of LUKS-encrypted volumes

• Networking Issues, Manual configuration of network cards; connectivity issues; network diagnostic tools; monitor packets; tune kernel parameters; troubleshoot SAN communication

• Application Issues, An overview of tools and techniques for troubleshooting applications; some common application problems and how to solve them

• Security Issues, Working effectively with (and not against) security tools, including SELinux, authentication, and firewall

• Red Hat Resources, Support options; Knowledgebase; certified training; initiating support calls; TAM support; developer support; Bugzilla; support workflow; diagnostic and information-gathering tools

AUDIENCE FOR THIS COURSE

Experienced Linux system administrators who have responsibilities that include troubleshooting their enterprise Linux environment.

(7)

RED HAT CERTIFIED OPENSTACK ADMINISTRATOR [CL210]

An IT professional who has earned the Red Hat Certified System Administrator in Red Hat OpenStack® has demonstrated the skills, knowledge, and abilities needed to create, configure, and manage private clouds using Red Hat Enterprise Linux OpenStack Platform.

Red Hat OpenStack Administration is one of our emerging technology courses. This series of courses focuses on Red Hat's evolving technologies. Emerging technology courses are feature-and functionality-focused and are conducted like guided labs.

Through hands-on labs, students will explore fault-tolerant and redundant configurations of Red Hat Enterprise Linux OpenStack Platform, and will also look at the future plans of the OpenStack development community.

COURSE CONTENT SUMMARY:

• Get an overview of the Red Hat Enterprise Linux OpenStack Platform architecture • Install Red Hat Enterprise Linux OpenStack Platform using packstack

• Deploy each Red Hat Enterprise Linux OpenStack Platform service manually • Manage users and projects

• Deploy instances, and use Heat to deploy and customize instances

COURSE OVERVIEW

• Red Hat Enterprise Linux OpenStack Platform architecture • Red Hat Enterprise Linux OpenStack Platform installation • RabbitMQ message broker

• Keystone identity service • Swift object storage service • Glance image service • Cinder block storage service • Networking service

• Nova compute and controller services • Implement an additional compute node • Heat orchestration service

• Ceilometer metering service

• The future of the OpenStack development community • Comprehensive review

PREREQUISITES FOR THIS COURSE:

Red Hat Certified System Administrator (RHCSA) or requisite level of knowledge highly recommended

(8)

RED HAT CERTIFICATE OF EXPERTISE IN SERVER HARDENING [RH413]

An IT professional who has earned the Red Hat Certificate of Expertise in Server Hardening has demonstrated the knowledge, skills, and abilities needed to understand and apply standards-based best practices to secure Red Hat Enterprise Linux systems against unauthorized access.

Many security policies and standards require systems administrators to address specific user authentication concerns, application of updates, system auditing and logging, file system integrity, and more. Red Hat Server Hardening provides strategies for addressing specific policy and configuration concerns. This course can also help you prepare for the Red Hat Certificate of Expertise in Server Hardening exam (EX413).

COURSE OVERVIEW:

• Track security updates • Manage software updates

• Allocate an advanced file system layout and use file system encryption.

• Adjust file system properties through security related options and file system attributes. • Manage special permissions

• Manage additional file access controls

• Configure software to monitor the files on your machine for changes. • Manage user accounts

• Manage pluggable authentication modules (PAMs)

• Apply changes to PAMs to enforce different types of rules on users. • Secure console access

• Install central authentication • Manage central authentication • Configure system logging • Configure system auditing • Control access to network services • Comprehensive review

PREREQUISITES FOR THIS COURSE:

• Red Hat Certified Engineer (RHCE) certification, Red Hat Certified Systems Administrator (RHCSA) certification, or equivalent experience required

(9)

RED HAT CERTIFIED VIRTUALIZATION ADMINISTRATOR [RHCVA]

A Red Hat Certified Virtualization Administrator (RHCVA) possesses the skills, knowledge, and abilities required to deploy and manage virtualization infrastructure, hosts, and guests using Red Hat Enterprise Virtualization.

Students acquire the skills and knowledge to effectively create, deploy, manage, and migrate Linux and Microsoft Windows virtual machines hosted on either dedicated Red Hat Enterprise Virtualization Hypervisor nodes or Red Hat Enterprise Linux servers using Red Hat Enterprise Virtualization Manager. With hands-on labs and a deep dive into the technology, this training course is the perfect first step for enterprise planning or executing a virtualization deployment strategy.

AN RHCVA IS CAPABLE OF THE FOLLOWING TASKS:

• Installing Red Hat Enterprise Virtualization Manager

• Creating datacenters, clusters, pools, and templates in Red Hat Enterprise Virtualization Manager

• Installing and configuring Red Hat Enterprise Virtualization hypervisors to support Linux and Windows users and manage them using Red Hat Enterprise Virtualization Manager

• Performing essential management tasks such as logging and bookmarking

COURSE OVERVIEW:

• Overview of Red Hat Enterprise Virtualization

• Install, configure, and test Red Hat Enterprise Virtualization Manager.

• Install, configure, upgrade, and troubleshoot Red Hat Enterprise Virtualization Hypervisor. • Create datacenters and clusters using Red Hat Enterprise Virtualization Manager.

• Create and administer data, iso, and export storage domains using Red Hat Enterprise Virtualization. • Create logical networks using Red Hat Enterprise Virtualization Manager.

• Install, deploy, and manage virtual machines (VMs) with appropriate drivers and agents using Red Hat Enterprise Virtualization.

• Manage VMs with snapshots and share images using Red Hat Virtualization.

• Utilize templates, pools, and cloud-init to automate deployment of VMs using Red Hat Enterprise Virtualization. • Locate information using the Red Hat Enterprise Virtualization administration portal to generate reports of the

environment.

• Describe backing up and restoring Red Hat Enterprise Virtualization, making Red Hat Enterprise Virtualization highly available, and using the application programming interface (API).

• Install and configure a Red Hat Enterprise Linux host.

• Migrate VMs manually and automatically, and configure high availability with live migration using Red Hat Enterprise Virtualization.

• Comprehensive review

PREREQUISITES FOR THIS COURSE:

• IT professionals who have earned an Red Hat Certified System Administrator (RHCSA) certification or maintain the equivalent experience with Linux

• System administration experience on Microsoft Windows operating systems is beneficial but not necessary for this course

(10)

MANAGING CONTAINERS WITH RED HAT ENTERPRISE LINUX ATOMIC HOST (RH270)

Managing Containers with Red Hat® Enterprise Linux® Atomic Host (RH270) is designed for experienced Linux administrators, architects, and developers who want to manage containerized applications using the Docker command and Kubernetes.

COURSE OVERVIEW

Deploy and manage applications in a Docker containerized environment. Students will install and update Red Hat Enterprise Linux Atomic Host on a server, and deploy and manage applications in a Docker containerized environment.

OUTLINE FOR THIS COURSE

• Install Red Hat Enterprise Linux Atomic Host software on a server.

• Subscribe to Red Hat Network and update Red Hat Enterprise Linux Atomic Host software. • Download, deploy, customize, and save a container image.

• Build container images using Dockerfile and publish them using a private image registry. • Deploy a multitiered application using containers and Kubernetes.

• Deploy flannel to allow for a multitiered application to be replicated on multiple hosts. • Troubleshoot Red Hat Enterprise Linux Atomic

• Use support tools available to Red Hat Enterprise Linux Atomic Host to diagnose problem.

AUDIENCE AND PREREQUISITES

This course is intended for veteran Linux administrators, architects, and developers wishing to learn how to deploy and manage applications in a Docker containerized environment using Red Hat Enterprise Linux Atomic Host.

(11)

CERTIFIED ETHICAL HACKER [CEH]

To beat a hacker, you need to think like one! This is exactly what this class will teach you. It is the pinnacle of the most desired information security training program any information security professional will ever want to be in. To master the hacking technologies, you will need to become one.

ETHICAL HACKING

The definition of an Ethical Hacker is very similar to a Penetration Tester. The Ethical Hacker is an individual who is usually employed with the organization and who can be trusted to undertake an attempt to penetrate networks and/ or computer systems using the same methods and techniques as a Hacker.

CEH TRAINING

The Certified Ethical Hacker class will immerse the students into a hands-on environment where they will be shown how to conduct ethical hacking. They will be exposed to an entirely different way of achieving optimal information security posture in their organization; by hacking it! They will scan, test, hack and secure their own systems.

COURSE OUTLINE

• Introduction to Ethical Hacking • Footprinting and Reconnaissance • Scanning Networks

• Enumeration • System Hacking • Trojans and Backdoors • Viruses and Worms • Sniffers

• Social Engineering • Denial of Service • Session Hijacking • Hacking Webservers • Hacking Web Applications • SQL Injection

• Hacking Wireless Networks • Hacking Mobile Platforms

• Evading IDS, Firewalls, and Honeypots • Buffer Overflow

• Cryptography • Penetration Testing

COURSE DURATION - 40 Hours

OR

Online at your convenience, from the comfort of your home

(12)

COMPUTER HACKING FORENSICS INVESTIGATOR [CHFI]

CHFI v8 Program certifies individuals in the specific security discipline of computer forensics from a vendor-neutral perspective. The C|HFI certification will fortify the application knowledge of law enforcement personnel, system administrators, security officers, defense and military personal, legal professionals, bankers, security professionals, and anyone who is concerned about the integrity of the network infrastructure.

Computer hacking forensic investigation is the process of detecting hacking attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks.

Computer forensics is simply the application of computer investigation and analysis techniques in the interests of determining potential legal evidence. Evidence might be sought in a wide range of computer crime or misuse, including but not limited to theft of trade secrets, theft of or destruction of intellectual property, and fraud. Computer forensic investigators can draw on an array of methods for discovering data that resides in a computer system, or recovering deleted, encrypted, or damaged file information.

COURSE OUTLINE

• Computer Forensics in Today's World • Computer Forensics Investigation Process • Searching and Seizing Computers

• Digital Evidence

• First Responder Procedures • Computer Forensics Lab

• Understanding Hard Disks and File Systems • Windows Forensics

• Data Acquisition and Duplication

• Recovering Deleted Files and Deleted Partitions • Forensics Investigation using Access Data FTK • Forensics Investigation Using EnCase

• Steganography and Image File Forensics • Application Password Crackers

• Log Capturing and Event Correlation

• Network Forensics, Investigating Logs and Investigating Network Traffic • Investigating Wireless Attacks

• Investigating Web Attacks

• Tracking Emails and investigating Email Crimes • Mobile Forensics

• Investigative Reports • Becoming an Expert Witness

(13)

EC–COUNCIL CERTIFIED SECURITY ANALYST [ECSA]

The EC–Council Certified Security Analyst (ECSA) program is a comprehensive, standards-based, methodology intensive training program which teaches information security professionals to conduct real life penetration tests by utilizing EC-Council’s published penetration testing methodology.

This Penetration Testing training course uses real-time scenarios to train students in penetration testing methodologies. EC-Council’s Certified Security Analyst (ECSA) course will help you master a documented penetration testing methodology that is repeatable and that can be used in a penetration testing engagement, globally.

Benefits of Becoming ECSA

• ECSA is for experienced professionals and is backed by a Curriculum designed by the best in the field. • Students earn greater industry acceptance as seasoned security professionals.

• Certified Security Analysts learn to analyze the outcomes of security tools and security testing techniques. • The ECSA sets students on the path toward achieving the LPT certification.

COURSE OUTLINE

• Need for Security Analysis • TCP IP Packet Analysis

• Penetration Testing Methodologies • Customers and Legal Agreements • Rules of Engagement

• Penetration Testing Planning and Scheduling • Pre-penetration Testing Steps

• Information Gathering • Vulnerability Analysis • External Penetration Testing

• Internal Network Penetration Testing • Firewall Penetration Testing

• IDS Penetration Testing  

• Password Cracking Penetration Testing • Social Engineering Penetration Testing • Web Application Penetration Testing • SQL Penetration Testing

• Penetration Testing Reports and Post Testing Actions

(14)

EC-COUNCIL NETWORK SECURITY ADMINISTRATOR [ENSA] COURSE DESCRIPTION

The EC-Council's ENSA certification looks at the network security in defensive view while the CEH certification program looks at the security in offensive mode. The ENSA program is designed to provide fundamental skills needed to analyze the internal and external security threats against a network, and to develop security policies that will protect an organization's information. Students will learn how to evaluate network and Internet security issues and design, and how to implement successful security policies and firewall strategies. In addition, they will learn how to expose system and network vulnerabilities and defend against them.

WHO SHOULD ATTEND

System administrators, Network administrators and anyone who is interested in network security technologies.

COURSE OUTLINE

• Fundamentals of Computer Network • Network Protocols

• Protocol Analysis

• Hardening Physical Security • Network Security

• Security Standards Organizations • Security Standards

• Security Policy • IEEE Standards

• Network Security Threats

• Intrusion Detection System (IDS) and Intrusion Prevention Systems (IPS) • Firewalls

• Packet Filtering and Proxy Servers • Bastion Host and Honeypots • Securing Modems

• Troubleshooting Network • Hardening Routers

• Hardening Operating Systems • Patch Management

• Log Analysis • Application Security • Web Security • E-mail Security

• Authentication: Encryption, Cryptography and Digital Signatures • Virtual Private Networks and Remote Networking

• Wireless Network Security • Creating Fault Tolerance • Incident Response

• Disaster Recovery and Planning • Network Vulnerability Assessment

(15)

EC-COUNCIL CERTIFIED SECURE PROGRAMMER [ECSP-JAVA]

Today, Java is embedded in more than 3 billion devices such as laptops, data centers, game consoles, super computers, mobile phones, smart cards, and many more. Java is widely adopted because of its platform and architecture independent characteristics that encourages developers and industry alike.

ECSP-Java is comprehensive course that provides hands-on training covering Java security features, policies, strengths, and weaknesses. It helps developers understand how to write secure and robust Java applications and provides advanced knowledge in various aspects of secure Java development that can effectively prevent hostile and buggy code. The end result of security Java coding practices include saving valuable effort, money, time, and possibly the reputation of organizations using Javacoded applications.

WHAT WILL YOU LEARN?

• Java security principles and secure coding practices

• Java Security Platform, Sandbox, JVM, Class loading, Bytecode verifier, Security Manager, security policies, and Java Security Framework

• Secure Software Development Lifecycle, threat modelling, software security frameworks, and secure software architectures

• Best practices and standards and guidelines for secure file input/output and serialization • Java input validation techniques, validation errors, and best practices

• Java exceptions, erroneous behaviors, and the best practices to handle or avoid them • Secure authentication and authorization processes

• Java Authentication and Authorization Service (JAAS), its architecture, Pluggable Authentication Module (PAM) Framework, and access permissions through Java Security Model

• Secure Java concurrency and session management that includes Java Memory Model, Java Thread Implementation methods, secure coding practices, and guidelines for handling threads, race conditions, and deadlocks

• Core security coding practices of Java Cryptography that includes Encryption, KeyGenerator, implementation of Cipher Class, Digital Signatures, Secret Keys, and key management

• Various Java application vulnerabilities such as Cross-Site Scripting (XSS), Cross Site Request Forgery (CSRF), Directory Traversal vulnerability, HTTP Response Splitting attack, Parameter Manipulation, Injection Attacks and their countermeasures

• Coding testing and review techniques and practices

PREREQUISITES

You must be well-versed with Java programming language.

WHO SHOULD ATTEND

The ECSP certification is intended for programmers who are responsible for designing and building secure Windows/ Web based applications with Java. It is designed for developers who have Java development skills.

COURSE DURATION - 3 Days (8 Hours per day) or 12 Days (2 Hours per day)

OR

(16)

FEW OF OUR ACHIEVEMENTS

Participated in Apple World Wide Developer Conference (WWDC) 2013 in San Francisco

Participated in LinuxCon and CloupOpen NA 2014 in Chicago

Co-Creator of a internationally acclaimed product DigiValet (www.digivalet.com)

Creator of a leading Firewall, Content Filtering & Security Appliance MASK365-UTM

(www.pisces.net.in/ns.php)

Our Master Trainer Swapnil Jain is a Member of Linux Foundation

Swapnil Jain is one of few in the world to complete RHCA in less then 4 months to clear all exams in

first attempt and with record score (5 of them with 100% score).

COME CONNECT WITH US AT

COMPANY WEBSITE: http://www.pisces.net.in

FACEBOOK PAGE: https://www.facebook.com/mask365kc

FACEBOOK GROUP: https://facebook.com/groups/mask365

TWITTER: https://twitter.com/jswapnil

LINKEDIN: https://in.linkedin.com/in/jswapnil

TECH BLOG: http://www.techpage3.com

132 Bhagwandeen Nagar, Behind INOX Sapna Sangeeta

Figure

Updating...

References

Related subjects :