Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
?
Solved

Linux Security

Posted on 2006-06-08
1
Medium Priority
?
237 Views
Last Modified: 2010-04-11
Hello I went to a job interview in which the knowledge on linux security had to be vast. However, I was not disclosed detailed information on the solution in place, however I was told that Linux was used as the front line of defense and had a firewall installed on it which is open source according to the manager. I was wondering if you experts were familiar on those types of open source programs/solutions for linux.

I was also wondering where does that leave CISCO firewalls compared to the linux-only solution. In addition, the interviewer also told me that he taught CISCO in a technical shool for many years and that has left me wondering since he told me that there are Linux Security certifications that cost more than $3,000 US and that very very few people had those certs since they were so hard and costly.

Can somebody please enlighten me on this secret world of Linux Security. Thanks.

0
Comment
Question by:elyrodriguez
1 Comment
 
LVL 9

Accepted Solution

by:
gtkfreak earned 375 total points
ID: 16868243
All details on Linux Security can be found out on the internet. Linux uses a firewall in-built called iptables. You also have other firewalls like firestarter. These are open-source solutions for Linux. Configuration of rules and tuning instructions are available with them. You can also refer to HOWTOs published by the Linux communities on the internet. Many setups use old computers and dedicate them as firewall products. You also have proxy servers such as Squid and other software like spamassassin, netfilter, clamav (antivirus), snort intrusion detection system, network analyzers such as ethereal, vulnerability scanners such as nessus. To get to know more about these, you can install Linux on your computer and experiment on them. You can start with http://www.tldp.org and look for the HOWTO on Linux Security and further references.

AFAIK, the certification courses of RedHat i.e. RHCE are most popular. You can get more details on the Red Hat site on them.

0

Featured Post

Automating Your MSP Business

The road to profitability.
Delivering superior services is key to ensuring customer satisfaction and the consequent long-term relationships that enable MSPs to lock in predictable, recurring revenue. What's the best way to deliver superior service? One word: automation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Last month Marc Laliberte, WatchGuard’s Senior Threat Analyst, contributed reviewed the three major email authentication anti-phishing technology standards: SPF, DKIM, and DMARC. Learn more in part 2 of the series originally posted in Cyber Defense …
With more and more companies allowing their employees to work remotely, it begs the question: What are some of the security risks involved with remote employees and what actions should we take to secure them?
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
This video Micro Tutorial shows how to password-protect PDF files with free software. Many software products can do this, such as Adobe Acrobat (but not Adobe Reader), Nuance PaperPort, and Nuance Power PDF, but they are not free products. This vide…

581 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question