In most organizations, the only thought given to SELinux is remembering to turn it off when installing new systems. And yet as I respond to intrusion after intrusion on Linux systems, I know that most of them would never have happened had SELinux been properly deployed.
SELinux has been hampered by a suspicious pedigree (“It comes from the NSA—fear it!”) and a horrible initial roll-out (“This breaks everything—kill it with fire!”). But largely the issue is that the SELinux universe stands outside the normal Linux security model and troubleshooting strategy. Things break in mysterious ways when you enable SELinux, and the fixes are not obvious.
Instructor: Hal Pomeranz
Course Length: 6 Hours
Tuition: $225 USD
This page is for the On-Demand version of this course. Please check our Live Events Calendar for any live presentations of this class currently scheduled.
This two-part, hands-on course attempts to break down some of the barriers to SELinux adoption in your organization. Part One focuses on a high-speed introduction to SELinux and a troubleshooting strategy to help you diagnose and correct issues due to SELinux. Part Two gets into the guts of SELinux and provides guidance on developing SELinux policies for new services.
Students will learn basic commands for interacting with the SELinux universe as well as how to:
- Troubleshoot system issues where SELinux is enabled
- Correct issues so your applications can work safely with SELinux
- Extend the default SELinux policy to work with new applications
Who Should Take This Course
- Linux SREs and System Admins
- Security Engineers/Architects
- Linux Developers/DevOps
- SOC Analysts, Incident Responders
Audience Skill Level
Experience with Linux and the Linux command-line is preferred. No experience with SELinux is necessary or assumed.
Students should be comfortable working with the Linux command line.
What Each Student Should Bring
- High-speed Internet access
- A BitTorrent client for downloading course materials (e.g., Transmission)
- A computer with at least 150GB of free space and capable of running a 64-bit VMware virtual machine using 4GB of RAM
What Students Will Be Provided
Students will receive course slides, author notes, lab exercises and virtual machine, all via electronic download.
About Our On-Demand Courses…
Learn at your own pace with access to course content, lectures, and demos in the Antisyphon On-demand learning platform. Many courses are offered with lifetime access to the course and content updates. On-demand courses include content update alerts, access to dedicated support channels in the Antisyphon Discord server, a certificate of completion, and complimentary access to the Antisyphon Cyber Range*.
* Cyber Range access and other course features may vary from course to course. See the specific details for each course on its registration page.
Trainer & Author
Hal Pomeranz is an independent digital forensic investigator who has consulted on cases ranging from intellectual property theft, to employee sabotage, to organized cybercrime and malicious software infrastructures. He has spent more than thirty years providing pragmatic Information Technology and Security solutions for some of the world’s largest commercial, government, and academic institutions.