Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

Linux Security

Posted on 2006-06-08
1
Medium Priority
?
231 Views
Last Modified: 2010-04-11
Hello I went to a job interview in which the knowledge on linux security had to be vast. However, I was not disclosed detailed information on the solution in place, however I was told that Linux was used as the front line of defense and had a firewall installed on it which is open source according to the manager. I was wondering if you experts were familiar on those types of open source programs/solutions for linux.

I was also wondering where does that leave CISCO firewalls compared to the linux-only solution. In addition, the interviewer also told me that he taught CISCO in a technical shool for many years and that has left me wondering since he told me that there are Linux Security certifications that cost more than $3,000 US and that very very few people had those certs since they were so hard and costly.

Can somebody please enlighten me on this secret world of Linux Security. Thanks.

0
Comment
Question by:elyrodriguez
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 9

Accepted Solution

by:
gtkfreak earned 375 total points
ID: 16868243
All details on Linux Security can be found out on the internet. Linux uses a firewall in-built called iptables. You also have other firewalls like firestarter. These are open-source solutions for Linux. Configuration of rules and tuning instructions are available with them. You can also refer to HOWTOs published by the Linux communities on the internet. Many setups use old computers and dedicate them as firewall products. You also have proxy servers such as Squid and other software like spamassassin, netfilter, clamav (antivirus), snort intrusion detection system, network analyzers such as ethereal, vulnerability scanners such as nessus. To get to know more about these, you can install Linux on your computer and experiment on them. You can start with http://www.tldp.org and look for the HOWTO on Linux Security and further references.

AFAIK, the certification courses of RedHat i.e. RHCE are most popular. You can get more details on the Red Hat site on them.

0

Featured Post

On Demand Webinar: Networking for the Cloud Era

Did you know SD-WANs can improve network connectivity? Check out this webinar to learn how an SD-WAN simplified, one-click tool can help you migrate and manage data in the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

A look at what happened in the Verizon cloud breach.
Ever wonder what it's like to get hit by ransomware? "Tom" gives you all the dirty details first-hand – and conveys the hard lessons his company learned in the aftermath.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…

722 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question