Linux/Unix operating systems are designed to be highly secure. Of course, highly secure does not mean completely secure—not even close. Often times, breaches are caused by simple misconfigurations, or other errors, which introduce dangerous backdoors. In this on-demand webinar session, we will start with many of the basics that are important not to overlook, then kick-it-up a notch to help you bring your Linux/Unix systems administration and security program to the next level. Foremost in this discussion is exploring how to properly configure identity, access, authentication, authorization and auditing (IAAAA).

Webinar attendees will gain:

  • A Linux/Unix security checklist useful in any environment for any sysadmin level
  • Steps for securing common Linux/Unix configuration issues
  • Know-how for building a secure IAAAA Linux/Unix infrastructure
  • Techniques for ensuring Linux/Unix servers stay secure after initial lock-down
  • Guidance on selecting technologies to help secure Linux/Unix environments
Whether you’re a Unix/Linux security newcomer, or a veteran, this session will provide you with actionable tips on tools and techniques for locking down your Linux/Unix environment.
B in a circle

Ron Woerner

CISSP, CISM, ECSA, and Information Security Trusted Advisor

Ron Woerner is a noted speaker and writer in the security industry and the Director of the M.S. Cybersecurity program at Bellevue University, an award-winning leader in educating adult learners online and in the classroom. He has 20 years of corporate experience in information technology and security, and he has worked for HDR, TD Ameritrade, ConAgra Foods, Mutual of Omaha, CSG Systems and the State of Nebraska. Ron earned his B.S. in computer science from Michigan State University and his M.S. in information resources management from Syracuse University. He is a Certified Information Security Professional (CISSP) and Certified Ethical Hacker (CEH).

Certifications: CISSP, CISM, CEH, CHFI, PCI QSA