THREE   |   FOUR   |   85%   |   24

            SCENARIOS                       LABS                     HANDS-ON           DURATION

This course explores the various tools and techniques commonly used by Linux system administrators and end-users to achieve their day-to-day work in a Linux environment using automation techniques. Linux Operations course is designed for experienced computer users who have limited or no previous exposure to Linux, whether they are working in an individual or Enterprise environment.

LAB 01

Writing Bash Scripts

LAB 02

Advanced Log Phrasing

LAB 03

Creating Network Automations

LAB 04

Using Dockers

Scenario: TRL001

A Utah-based wind and solar energy company have suffered from a Denial-of-service attack that caused a shut off to a part of the company computing assets. You need to analyze the captured traffic to learn about the attack and the attacker.


Scenario: TRL002

A recent update by Oracle appeared to be bugged; hackers can exploit this vulnerability. Your mission is to scan the company’s assets and discover service versions to protect them from the recent bug.


Scenario: TRL003

An attempt was made to intrude on a US utility’s Firewall. The incident caused a brief communication disruption between remote sites. You have been hired to study the Firewall strength and weaknesses to block the next attempt.

Annotation 2020-05-21 170113.jpg

© 2020 by ThinkCyber

THE 2020