Book Image

Advanced SELinux System Administration [Video]

By : Sven Vermeulen
5 (1)
Book Image

Advanced SELinux System Administration [Video]

5 (1)
By: Sven Vermeulen

Overview of this book

<p><span id="description" class="sugar_field">Do you have the crucial job of protecting your private and company systems from malicious attacks and undefined application behavior? Are you looking to secure your Linux systems with improved access controls? Look no further, intrepid administrator! This course will show you how to enhance your system's secure state across Linux distributions, helping you keep application vulnerabilities at bay. This video course covers the core SELinux concepts and shows you how to leverage SELinux to improve the protective measures of a Linux system. You will learn SELinux fundamentals and all of SELinux's configuration handles including conditional policies, constraints, policy types, and audit capabilities. These topics are paired with genuine examples of situations and issues you are bound to come across as an administrator.</span></p> <h2><span class="sugar_field">Style and Approach</span></h2> <p><span class="sugar_field"><span id="trade_selling_points_c" class="sugar_field">This course supplies an in-depth understanding of SELinux administration and how it integrates with other components on a Linux system. It covers the majority of SELinux features with a mix of real-life scenarios, descriptions, and examples. This course contains everything an administrator needs to customize SELinux and its policies.</span></span></p>
Table of Contents (4 chapters)
Chapter 4
Analyzing Policy Behavior
Content Locked
Section 2
Domain Transition Analysis
An important analytical approach when dealing with SELinux policies is to perform a domain transition analysis. Let’s go ahead to explore it! - Use apol for domain transition analysis - Use sedta for domain transition analysis