Search our courses
Training

This SE Linux Policy Administration Training course takes a deep dive into the complexities and nuances of SELinux. The course discusses security threats posed to today’s computing resources and mitigating them through network and host protections. Students will review SELinux technology through understanding SELinux’s goals, how it has evolved including its features and limitations.

Students will gain hands-on experience in working with SELinux modes, virtualization, and container security. The core of the course is learning and understanding SELinux policy through, choosing, managing, and studying policy examples. Once students have an understanding of the SELinux policy the course will cover writing policy modules. The course is capped with multiple discussions on case studies that explore building SELinux policies. This SELinux course covers one of the major challenge faced by administering SELinux, SELinux troubleshooting.

Version: A03

SE Linux Policy Administration Training

Course Code

GTSLPA

Duration

3 Day

Course Fee

POA

Accreditation

N/A

Target Audience

  • This SE Linux Policy Administration Training course is designed for system administrators and IT professionals who need to gain a hands-on knowledge of Linux network configuration and services.

Attendee Requirements

Expand all

Course Description

This SE Linux Policy Administration Training course takes a deep dive into the complexities and nuances of SELinux. The course discusses security threats posed to today’s computing resources and mitigating them through network and host protections. Students will review SELinux technology through understanding SELinux’s goals, how it has evolved including its features and limitations.

Students will gain hands-on experience in working with SELinux modes, virtualization, and container security. The core of the course is learning and understanding SELinux policy through, choosing, managing, and studying policy examples. Once students have an understanding of the SELinux policy the course will cover writing policy modules. The course is capped with multiple discussions on case studies that explore building SELinux policies. This SELinux course covers one of the major challenge faced by administering SELinux, SELinux troubleshooting.

Version: A03

Course Outline

    1. Computing Security & SELinux Overview

  1.         Security Threats
  2.         Network and Host Protection
  3.         Shortcomings of Traditional Unix Security
  4.         DAC vs. MAC
  5.         SELinux Goals
  6.         SELinux Evolution
  7.         SELinux Features and Limitations
  8.         SELinux Contexts
  9.         Labels
  10.         Access Decisions
  11.         Transition Decisions: Processes
  12.         SELinux Example

    Lab Tasks

  1.         System Preparation
  2.         Contexts

    2. Working with SELinux

  1.         SELinux Modes
  2.         Gathering SELinux Information
  3.         SELinux Virtual Filesystem
  4.         Core Commands and SELinux
  5.         SELinux Management Utilities
  6.         Context and File Operations
  7.         Managing File Context Database
  8.         Managing Contexts
  9.         Booleans
  10.         SELinux Mount Options
  11.         Virtualization Security
  12.         Container Security
  13.         Securing Networked Services
  14.         Managing Port Contexts

    Lab Tasks

  1.         Exploring SELinux Modes
  2.         Gathering Information
  3.         Managing SELinux Booleans
  4.         Managing Contexts
  5.         Mounting Filesystems
  6.         Manual Relabel
  7.         GUI Utilities

    3. Policies

  1.         The SELinux Policy
  2.         Choosing an SELinux Policy
  3.         Policy Layout
  4.         Examining Policy
  5.         Managing Policies
  6.         Targeted Policy
  7.         Targeted Policy Example: Apache
  8.         Targeted Policy Example: Other Contexts
  9.         Minimum Policy
  10.         MLS Policy Overview
  11.         MCS Translation
  12.         Polyinstantiated Directories

    4. Users & Roles

  1.         Overview of Roles
  2.         Roles
  3.         User Mappings
  4.         Kiosk User (xguest)
  5.         Controlling Application Execution

    Lab Tasks

  1.         SELinux Identities and Roles
  2.         Kiosk User

    5. Troubleshooting SELinux

  1.         Access Denied. Now what?
  2.         AVC Denied Examples
  3.         Incorrect File Context
  4.         Permissive Domains
  5.         Using audit2allow

    Lab Tasks

  1.         Troubleshooting using Permissive Domains
  2.         Using audit2why and audit2allow to create policy

    6. Writing Policy Modules

  1.         SELinux Policy Tools
  2.         SELinux Policy Source
  3.         Reference Policy Source Exploration
  4.         Process Transitions
  5.         Object classes
  6.         Policy Macros
  7.         Creating Booleans
  8.         Using Booleans in Policies
  9.         Other Policy Commands
  10.         Writing Policy Modules

    Lab Tasks

  1.         Domain Transition Exploration
  2.         Exploring SELinux Modes
  3.         Writing a Simple Module
  4.         Defining and using booleans
  5.         Creating & Compiling Policy from Source
  6.         Using seplogen

    7. Case Study: Securing an Application Lab Tasks

  1.         SELinux Policy Building: Case Study 1

    8.  Case Study: Securing an Application Lab Tasks

  1.         SELinux Policy Building: Case Study 2

    9. Bonus Labs: Lab Tasks

  1.         Installing and Switching Policies
  2.         Minimum policy
  3.         MCS Exploration
  4.         MCS Restrictions
  5.         Polyinstantiated Directories
Learning Path
Ways to Attend
  • Attend a public course, if there is one available. Please check our schedule, or register your interest in joining a course in your area.
  • Private onsite Team training also available, please contact us to discuss. We can customise this course to suit your business requirements.

Private Team Training is available for this course

We deliver this course either on or off-site in various regions around the world, and can customise your delivery to suit your exact business needs. Talk to us about how we can fine-tune a course to suit your team's current skillset and ultimate learning objectives.

Private Team Training | Contact us

Technical ICT learning & mentoring services

Private Team Training

Our instructors are specialist consultants with vast real world experience and expertise allowing them to design and deliver client-focused courses for your organisation.

Learn more about our Private Team Training

What Our Clients Say

“I particularly liked the heavy hands on sessions that went on with the training. Other than that, really liked Mark's training style. His experience in the field really shines through.”

 

Docker - GTDK1

Feb ‘19

“Instructor's ability to demonstrate new features that are not part of the course help show his mastery as well as prepare us for changes in the technology. Great work.

 

Using Docker & Kubernetes in Production - GTK8SG

Oct ‘18


“This course was an excellent insight into the Cloud Service Management world and equips me with the tools to go back to my company and build upon it.”

 

Cloud Service Manager - GTC13

Jan ‘19

 

''Fantastic course, looking forward to applying this in my work and home life. Excellent, practical approach, very motivational. I think the entire company should attend training.''

 

Being Agile in Business - GTBAB

Sept '19

“Excellent instructor. You can tell he really understands the concepts he's presenting and is very passionate about his work. He answered every question we asked and presented the course in an interesting and involving manner.”

 

Spring Boot Development - GTIT40

Nov ‘18

"Intelligence is the ability to avoid doing work, yet
getting the work done"

Linus Torvalds, creator of Linux and GIT

Technical ICT learning & mentoring services

About GuruTeam

GuruTeam is a high-level ICT Learning, Mentoring and Consultancy services company. We specialise in delivering instructor-led on and off-site training in Blockchain, Linux, Cloud, Big Data, DevOps, Kubernetes, Agile, Software & Web Development technologies. View our Testimonials

Download our eBrochure
Our Accreditation Partners

 

  •  
  •  
  •  
  •  
  •  

 

 

 

 

 

Upcoming Courses

Kubernetes Administration

16th - 19th December - Dublin

This Kubernetes Administration Certification training course is suitable for anyone who wants to learn the skills necessary to build and administer a Kubernetes cluster

Learn More

CompTIA Network+ FastTrack

11th - 14th November - Cork

This fast-paced course teaches the essentials of networking and helps to prepare the student for the CompTIA Network+ certification.

Learn More

Applied Data Science with Python

17th - 18th December - Dublin

Learn about the theoretical and practical aspects of using Python in the realm of Data Science, Business Analytics, and Data Logistics

Learn More

Introduction to Python 3

8th - 10th October - Cork

5th - 7th November - Cork

Python is a powerful and popular object-oriented programming/scripting language with many high quality libraries.

Learn More

Newsletter

Stay up to date, receive updates on scheduled dates, new courses, offers, and events.

Subscribe to our Newsletter