15% off eLearning, up to 20% off virtual courses - use code: NSWOCT25USA

da737aea-690c-4af3-875e-d187562085df

Linux System Security

Select your learning method

Learn essential skills
Course overview

Created for skilled Linux professionals, our Linux security training delivers hands-on knowledge to help you mitigate risk and maintain compliance. You’ll explore essential tools including firewalls, audit frameworks and SELinux, while also learning how to proactively detect vulnerabilities and safeguard systems in real time. 

Build advanced Linux security expertise

Our intensive four‑day instructor-led Linux System Security course prepares administrators to detect and remediate weaknesses. Through hands-on labs, you'll master auditing, system hardening and protection strategies. Giving you the skills to lock down your infrastructure, improve resilience and uphold regulatory and internal security standards. 

Learning objectives
  • Grasp core security concepts 
  • Safeguard user accounts and privileges 
  • Analyse system logs and audit records 
  • Deploy SELinux policies and firewall rules 
  • Set up intrusion monitoring tools 
  • Strengthen application and authentication layers 
  • Safeguard data using encryption 
  • Evaluate and fix security exploit paths 

What you’ll learn

Throughout this course, you’ll cover key areas of Linux system security and apply each concept in a hands-on live lab setting. You’ll build the knowledge and practical skills needed to protect Linux infrastructures, addressing risks from individual user activity through to full system vulnerabilities. 

User account and permissions

Develop the expertise to manage Linux user accounts securely and effectively. Learn how to configure user defaults, implement strong password protocols, and control file-level access. Monitor login behaviour, apply permission strategies, and reduce vulnerabilities by enforcing consistent user restrictions across your Linux systems. 

System logging and audit trails

Learn how to implement and optimise Linux logging and auditing to support real-time security analysis. You’ll configure the audit framework, track key system activity, and filter logs for critical events. Building on this, you’ll develop performance-aware rules to monitor changes, investigate anomalies and produce traceable reports for compliance and incident response. 

Malware and intrusion detection

Discover how to protect Linux systems by configuring tools such as AIDE and ClamAV to detect file changes, scan for malware and review alerts. You’ll also explore rootkit detection, evaluate tool limitations and apply updates to support a stronger, more responsive security strategy. 

File and data security

Gain practical knowledge to secure files and data using access controls, extended attributes and encryption. Explore partitioning strategies, sanitisation tools and LUKS disk protection. You’ll also configure Sudo for safe privilege use and examine password cracking tools to identify vulnerabilities and protect data throughout its lifecycle. 

What’s included
  • Four days of hands-on, instructor-led learning 
  • Practical exercises using live lab environments 
  • Seasoned Linux security experts 
  • Live virtual classroom availability 
  • Full set of digital course materials 
  • Post-course guides and downloadable tools 
  • Real enterprise-grade case studies 
  • Multiple public intake dates 

Key facts

Ideal for

This course is designed for Linux System Administrators who already have hands-on experience and are looking to deepen their knowledge of system security. 

Prerequisites

A solid foundation in Linux system administration is required. Prior completion of training in Red Hat, SUSE or Oracle Linux is recommended to get the most out of the course. 

Learning experience

Our experienced trainers and interactive labs create a focused, practical environment – so you can put theory into practice from day one. 

FAQs

This practical course is designed for experienced Linux administrators who want to strengthen their system security skills. Covering topics such as auditing, firewalls, SELinux, user access controls, intrusion detection and encryption, the training takes place in a hands-on lab environment for real-world application. 

Is this course for Linux starters?

This course is designed for system administrators who already have hands-on experience managing Linux systems. You should be familiar with command-line operations, basic system configuration and security concepts. If you're still building that knowledge, ILX provides beginner-friendly Linux courses to help you get started. 

Can I apply it on Ubuntu or SUSE?

Yes, absolutely. Although we deliver the course using a Red Hat/CentOS-based system for demonstration, all topics are equally relevant across other enterprise-grade Linux distributions, such as Ubuntu, SUSE, and Oracle Linux. The focus is on standardised tools and best-practice methodologies that are transferable across systems. We also discuss distribution-specific nuances during the course. 

What topics are covered in this Linux security course?

The course covers key areas including SELinux, firewalls, auditing, user access control, intrusion detection, password policies and encryption. You’ll gain hands-on experience through live labs, learning how to secure Linux systems and respond to security threats across various environments and distributions. Helping you to reduce operational risk and improve compliance. 

Will I learn how to configure firewalls and SELinux?

Yes. You’ll learn to configure firewalld, apply zone-based filtering, create rich rules and manage services. The course also covers SELinux fundamentals, context management, policy modules and command usage, giving you the skills to apply mandatory access control in real-world Linux environments. Enabling you to protect critical infrastructure and maintain secure access controls across your organisation. 

Is intrusion detection part of the course content?

Yes, intrusion detection is a key focus. You’ll use tools lsuch as AIDE and ClamAV to identify file changes and scan for malware. The course also covers rootkit detection, alert monitoring and performance-aware logging, helping you to secure systems and support incident response. By strengthening intrusion detection, you’ll ensure your business can respond quickly to threats and minimise downtime. 

Why study with ILX
500,000+ learners

Join the half a million learners developing their skills with our training 

5,000+ businesses

A trusted partner to thousands of organisations worldwide 

96% customer satisfaction

Our passionate team goes above and beyond to support customer needs 

We're here to help
Speak to our learning experts

Not sure which course or study option is right for you? Get in touch with our team of advisors for personalised guidance and support throughout your learning journey.

Business transformation
Looking to develop your business or team?

Need to upskill your team? Our bespoke development solutions are designed to enhance team performance, retain talent, and drive organisational excellence. One of our development consultants would love to chat.

Quote request

Please complete the form to ensure your quote is accurate and we will contact you soon.

By submitting this form, you agree to ILX processing your data in line with our Privacy Policy. You can unsubscribe at any time by clicking the link in our emails or contacting us directly.

Page {{ step }} of 2

Back Next