<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.lpi.org/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Jannamillers</id>
	<title>LPI Wiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.lpi.org/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Jannamillers"/>
	<link rel="alternate" type="text/html" href="https://wiki.lpi.org/wiki/Special:Contributions/Jannamillers"/>
	<updated>2026-04-12T03:34:21Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.45.1</generator>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=LPIC-303_Objectives_V1&amp;diff=104</id>
		<title>LPIC-303 Objectives V1</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=LPIC-303_Objectives_V1&amp;diff=104"/>
		<updated>2010-03-11T17:16:41Z</updated>

		<summary type="html">&lt;p&gt;Jannamillers: /* 320.1 OpenSSL */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Introduction==&lt;br /&gt;
TODO: Need a description for exam here&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
==Version Information==&lt;br /&gt;
These objectives are version 1.0.0. &lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
==Objectives==&lt;br /&gt;
===&#039;&#039;Topic 320: Cryptography&#039;&#039;===&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;320.1 OpenSSL&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should know how to configure and use OpenSSL. This includes creating your own Certificate Authority and issues SSL certificates for various applications.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
*[http://www.bestdissertation.com/services/dissertation.html  	 dissertation writing]&lt;br /&gt;
* certificate generation&lt;br /&gt;
* key generation&lt;br /&gt;
* SSL/TLS client and server tests &lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* openssl&lt;br /&gt;
* RSA, DH and DSA&lt;br /&gt;
* SSL&lt;br /&gt;
* X.509&lt;br /&gt;
* CSR&lt;br /&gt;
* CRL &lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;320.2 Advanced GPG&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should know how to use GPG. This includes key generation, signing and publishing to keyservers. Managing multiple private key and IDs is also included.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* GPG encyption and signing&lt;br /&gt;
* private/public key management&lt;br /&gt;
* GPG key servers&lt;br /&gt;
* GPG configuration &lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* gpg&lt;br /&gt;
* gpgv&lt;br /&gt;
* gpg-agent&lt;br /&gt;
* ~/.gnupg/ &lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;320.3 Encrypted Filesystems&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to setup and configure encrypted filesystems. &lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* LUKS&lt;br /&gt;
* dm-crypt and awareness of CBC, ESSIV, LRW and XTS modes &lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* dm-crypt&lt;br /&gt;
* cryptmount&lt;br /&gt;
* cryptsetup &lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
===&#039;&#039;Topic 321: Access Control&#039;&#039;===&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;321.1 Host Based Access Control&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with basic host based access control such as nsswitch configuration, PAM and password cracking. &lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* PAM and PAM configuration files&lt;br /&gt;
* password cracking&lt;br /&gt;
* nsswitch &lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* nsswitch.conf&lt;br /&gt;
* john &lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;321.2 Extended Attributes and ACLs&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates are required to understand and know how to use Extended Attributes and Access Control Lists. &lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* ACLs&lt;br /&gt;
* EAs and attribute classes &lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* getfacl&lt;br /&gt;
* setfacl&lt;br /&gt;
* getfattr&lt;br /&gt;
* setfattr &lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;321.3 SELinux&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 6&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should have a thorough knowledge of SELinux. &lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* SELinux configuration and command line tools&lt;br /&gt;
* TE, RBAC, MAC and DAC concepts and use &lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* fixfiles/setfiles&lt;br /&gt;
* newrole&lt;br /&gt;
* setenforce/getenforce&lt;br /&gt;
* selinuxenabled&lt;br /&gt;
* semanage&lt;br /&gt;
* sestatus&lt;br /&gt;
* /etc/selinux/&lt;br /&gt;
* /etc/selinux.d/ &lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;321.4 Other Mandatory Access Control Systems&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with other Mandatory Access Control systems for Linux. This includes major features of these systems but not configuration and use.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* SMACK&lt;br /&gt;
* AppArmor &lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* SMACK&lt;br /&gt;
* AppArmor &lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
===&#039;&#039;Topic 322: Application Security&#039;&#039;===&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;322.1 BIND/DNS&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should have experience and knowledge of security issues in use and configuration of BIND DNS services. &lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* BIND v9&lt;br /&gt;
* BIND vulnerabilities&lt;br /&gt;
* chroot environments &lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* TSIG&lt;br /&gt;
* BIND ACLs&lt;br /&gt;
* named-checkconf &lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;322.2 Mail Services&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should have experience and knowledge of security issues in use and configuration of Postfix mail services. Awareness of security issues in Sendmail is also required but not configuration.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Postfix security centric configuration&lt;br /&gt;
* securing Sendmail&lt;br /&gt;
* chroot environments &lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* /etc/postfix/&lt;br /&gt;
* TLS &lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;322.3 Apache/HTTP/HTTPS&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should have experience and knowledge of security issues in use and configuration of Apache web services. &lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Apache v1 and v2 security centric configuration &lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* SSL&lt;br /&gt;
* .htaccess&lt;br /&gt;
* Basic Authentication&lt;br /&gt;
* htpasswd&lt;br /&gt;
* AllowOverride &lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;322.4 FTP&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 1&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should have experience and knowledge of security issues in use and configuration of Pure-FTPd and vsftpd FTP services.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Pure-FTPd configuration and important command line options&lt;br /&gt;
* vsftpd configuration&lt;br /&gt;
* chroot environments &lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* SSL/TLS&lt;br /&gt;
* vsftp.conf &lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;322.5 OpenSSH&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should have experience and knowledge of security issues in use and configuration of OpenSSH SSH services. &lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* OpenSSH configuration and command line tools&lt;br /&gt;
* OpenSSH key management and access control&lt;br /&gt;
* Awareness of SSH protocol v1 and v2 security issues &lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* /etc/ssh/&lt;br /&gt;
* ~/.ssh/&lt;br /&gt;
* ssh-keygen&lt;br /&gt;
* ssh-agent&lt;br /&gt;
* ssh-vulnkey &lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;322.6 NFSv4&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 1&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should have experience and knowledge of security issues in use and configuration of NFSv4 NFS services. Earlier versions of NFS are not required knowledge.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* NFSv4 security improvements, issues and use&lt;br /&gt;
* NFSv4 pseudo file system&lt;br /&gt;
* NFSv4 security mechanisms (LIPKEY, SPKM, Kerberos) &lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* NFSv4 ACLs&lt;br /&gt;
* nfs4acl&lt;br /&gt;
* RPCSEC_GSS&lt;br /&gt;
* /etc/exports &lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;322.7 Syslog&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 1&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should have experience and knowledge of security issues in use and configuration of syslog services. &lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* syslog security issues&lt;br /&gt;
* chroot environments &lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* remote syslog servers &lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
===&#039;&#039;Topic 323: Operations Security&#039;&#039;===&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;323.1 Host Configuration Management&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with the use of RCS and Puppet for host configuration management. &lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* RCS&lt;br /&gt;
* Puppet &lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* RCS&lt;br /&gt;
* ci/co&lt;br /&gt;
* rcsdiff&lt;br /&gt;
* puppet&lt;br /&gt;
* puppetd&lt;br /&gt;
* puppetmasterd&lt;br /&gt;
* /etc/puppet/ &lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
===&#039;&#039;Topic 324: Network Security&#039;&#039;===&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;324.1 Intrusion Detection&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with the use and configuration of intrusion detection software. &lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Snort configuration, rules and use&lt;br /&gt;
* Tripwire configuration, policies and use &lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* snort&lt;br /&gt;
* snort-stat&lt;br /&gt;
* /etc/snort/&lt;br /&gt;
* tripwire&lt;br /&gt;
* twadmin&lt;br /&gt;
* /etc/tripwire/ &lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;324.2 Network Security Scanning&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with the use and configuration of network security scanning tools. &lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Nessus configuration, NASL and use&lt;br /&gt;
* Wireshark filters and use &lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* nmap&lt;br /&gt;
* wireshark&lt;br /&gt;
* tshark&lt;br /&gt;
* tcpdump&lt;br /&gt;
* nessus&lt;br /&gt;
* nessus-adduser/nessus-rmuser&lt;br /&gt;
* nessusd&lt;br /&gt;
* nessus-mkcert&lt;br /&gt;
* /etc/nessus &lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;324.3 Network Monitoring&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with the use and configuration of network monitoring tools. &lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Nagios configuration and use&lt;br /&gt;
* ntop &lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* ntop&lt;br /&gt;
* nagios&lt;br /&gt;
* nagiostats&lt;br /&gt;
* nagios.cfg and other configuration files &lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;324.4 netfilter/iptables&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with the use and configuration of iptables. &lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Iptables packet filtering and network address translation &lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* iptables&lt;br /&gt;
* iptables-save/iptables-restore &lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;324.5 OpenVPN&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with the use of OpenVPN.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* OpenVPN configuration and use &lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* /etc/openvpn/&lt;br /&gt;
* openvpn server and client&lt;/div&gt;</summary>
		<author><name>Jannamillers</name></author>
	</entry>
</feed>