Course Details

Previous Page


E-mail and Security in Linux


Overview/Description
Target Audience
Prerequisites
Expected Duration
Lesson Objectives
Course Number



Overview/Description
Linux has networking and system security as two of its fundamental design goals. Linux functions as the e-mail server for a large number of businesses and organizations. Those wishing to provide POP3 and IMAP mail access often turn to a system such as Courier or Dovecot to provide these services. This course demonstrates how to configure these systems. In addition, because of its strong-networked and secure framework, Linux can be configured as an excellent network router for small to medium applications. This course demonstrates how to configure Linux as a router and also provides the learner with the groundwork for securing and testing the security of a Linux installation. This course is for people taking Advanced Level Linux Professional (LPIC-2) Exam 201.

Target Audience
Administrators who are rolling out and supporting Linux in the enterprise; individuals seeking internationally recognized, distribution-neutral Linux certification

Prerequisites
Candidates must have an active LPIC-1 certification to receive LPIC-2 certification, but the LPIC-1 and LPIC-2 exams may be taken in any order.

Expected Duration (hours)
2.0

Lesson Objectives

E-mail and Security in Linux

  • install the Courier mail server
  • perform the post-installation of the Courier mail server
  • configure the Courier IMAP service
  • configure the Courier POP3 service
  • configure Dovecot mail server users
  • configure Dovecot mail server authentication
  • configure the Dovecot mail location
  • configure the Dovecot mail server for the POP3 service
  • install the Courier mail server
  • perform Courier post-installation tasks
  • configure the Courier IMAP and POP3 services
  • customize Dovecot mailbox location
  • manage firewall filter rules
  • secure a network using SNAT and IP masquerading
  • configure and display network routes
  • configure port redirection
  • configure Fail2ban to avoid brute-force attacks
  • configure Snort Inline's intrusion prevention system
  • configure Snort for intrusion detection
  • configure the nmap port-scanning tool
  • configure a Linux router
  • secure the Linux system
  • Course Number:
    lu_lalq_a02_it_enus