Avoiding the Lesser-Known “Gotchas” in Linux Privilege Management

Krystian Zieja, CQURE Academy Trainer

About this Webinar

Because of the important business functions Linux servers support, they can be ripe targets for external attackers and rogue insiders. Privilege management is one way to limit unwanted access, but controls can’t be so overbearing that admin productivity suffers. This webinar will demonstrate some common techniques – some of the lesser-known “gotchas” – used by attackers to elevate their privileges in your Linux environment, as well as information about the tools we can put in your arsenal, including:

  • Shadow password suite
  • Special permissions
  • Plugable Authentication Modules
  • Network Authentication with NIS and LDAP
  • Authorizing access with Polkit
  • Possible attacks on the above technologies

Join us as we take a deep look into how we can make our Linux infrastructures more secure, but still functional for our users.

Krystian Zieja, CQURE Academy Trainer

15 years of experience in the IT, system administration and performance tuning, as well as database administration software development and security field. Krystian is a professional Infrastructure and Database Consultant with over 15 years of extensive experience in designing IT solutions. His practice spans from teaching Oracle Courses in OAI at University, to providing services for big public and consulting companies serving Clients from four continents. Being a holder of numerous IT certificates such as OCP, MCSE, MCDBA and CISP, he is highly skilled in management as well as in programming SQL and NoSQL databases.