Join us at the Blue Team Summit! Register Here

SELinux Necessary and Not Evil with Hal Pomeranz

Course Authored by .

This two-part, hands-on course attempts to break down some of the barriers to SELinux adoption in your organization.

On-Demand $225.00

Course Length: 6 Hours

Includes a Certificate of Completion



Next scheduled date: Content is loading, please wait.

Description

This two-part, hands-on course attempts to break down some of the barriers to SELinux adoption in your organization.

Part One focuses on a high-speed introduction to SELinux and a troubleshooting strategy to help you diagnose and correct issues due to SELinux. Part Two gets into the guts of SELinux and provides guidance on developing SELinux policies for new services.

In most organizations, the only thought given to SELinux is remembering to turn it off when installing new systems. And yet as I respond to intrusion after intrusion on Linux systems, I know that most of them would never have happened had SELinux been properly deployed.

SELinux has been hampered by a suspicious pedigree (“It comes from the NSA—fear it!”) and a horrible initial roll-out (“This breaks everything—kill it with fire!”). But largely the issue is that the SELinux universe stands outside the normal Linux security model and troubleshooting strategy. Things break in mysterious ways when you enable SELinux, and the fixes are not obvious.

System Requirements
  • Student Requirements
    • A computer with high-speed Internet access
    • A BitTorrent client for downloading course materials (e.g., Transmission)
    • A computer with at least 150GB of free space and capable of running a 64-bit VMware virtual machine using 4GB of RAM

FAQ

Key Takeaways
Students will learn basic commands for interacting with the SELinux universe as well as how to:

Troubleshoot system issues where SELinux is enabled
Correct issues so your applications can work safely with SELinux
Extend the default SELinux policy to work with new applications
Who Should Take This Course
Linux SREs and System Admins
Security Engineers/Architects
Linux Developers/DevOps
SOC Analysts, Incident Responders
Audience Skill Level
Experience with Linux and the Linux command-line is preferred. No experience with SELinux is necessary or assumed.
Other Student Requirements
Students should be comfortable working with the Linux command line.
What Each Student Will Be Provided With
Students will receive course slides, author notes, lab exercises and virtual machine, all via electronic download.

About the Instructor

Pixel splash background
Hal Pomeranz
Hal Pomeranz
"Computer Forensics and Information Security, often with a spicy Linux flavor. Expert Witness. Trainer."
Bio

Hal Pomeranz is an independent digital forensic investigator who has consulted on cases ranging from intellectual property theft, to employee sabotage, to organized cybercrime and malicious software infrastructures. He has spent more than thirty years providing pragmatic Information Technology and Security solutions for some of the world’s largest commercial, government, and academic institutions.

On-Demand

Antisyphon's On-Demand classes give you flexible, self-paced access to the same high-quality training our live events are known for. Whether you're diving into forensics, cloud security, or offensive tooling, each course includes:

  • Full access to video recordings, slides, and downloadable resources
  • Hands-on labs and virtual machines to reinforce real-world skills
  • Cyber Range access for immersive practice (select courses)
  • Dedicated Discord support from instructors and peers
  • Certificates of participation upon completion

Start learning when it works for you!
No deadlines, no pressure. Just real, practical cybersecurity training on your schedule.

Purchase:
Content is loading, please wait.
Shopping Cart

No products in the cart.