Book Image

Advanced SELinux System Administration [Video]

By : Sven Vermeulen
5 (1)
Book Image

Advanced SELinux System Administration [Video]

5 (1)
By: Sven Vermeulen

Overview of this book

<p><span id="description" class="sugar_field">Do you have the crucial job of protecting your private and company systems from malicious attacks and undefined application behavior? Are you looking to secure your Linux systems with improved access controls? Look no further, intrepid administrator! This course will show you how to enhance your system's secure state across Linux distributions, helping you keep application vulnerabilities at bay. This video course covers the core SELinux concepts and shows you how to leverage SELinux to improve the protective measures of a Linux system. You will learn SELinux fundamentals and all of SELinux's configuration handles including conditional policies, constraints, policy types, and audit capabilities. These topics are paired with genuine examples of situations and issues you are bound to come across as an administrator.</span></p> <h2><span class="sugar_field">Style and Approach</span></h2> <p><span class="sugar_field"><span id="trade_selling_points_c" class="sugar_field">This course supplies an in-depth understanding of SELinux administration and how it integrates with other components on a Linux system. It covers the majority of SELinux features with a mix of real-life scenarios, descriptions, and examples. This course contains everything an administrator needs to customize SELinux and its policies.</span></span></p>
Table of Contents (4 chapters)
Chapter 4
Analyzing Policy Behavior
Content Locked
Section 3
Information Flow Analysis
Can you find, how a domain could leak (purposefully or not) information toward another domain? This video, probably gives you an answer to this. - Use apol for information flow analysis - Use seinfoflow for information flow analysis