Linux - Networking and Cybersecurity in Cloud

Rs.40,000 + GST.
50% discount for women and transgender.
  • Overview
  • Syllabus

Course objectives

  • To provide a student a solid understanding about…
  • To impart theoretical knowledge and practical skills about…
  • Upskill the student looking for a career in System Admin, Cloud Engineer, Devops Engineer, Network Engineer and Cybersecurity.


  • A bachelor's degree in any field.


  • Familiarity with Linux and the command line.

Target Segment

  • College final year students.
  • UG/PG students looking to upskill in IT.
  • Working professionals looking for a career switch to Linux Admin and similar roles.


  • The course will be delivered online via Zoom meeting.
  • Each class will be of 2 hours duration. It is divided into a 1 hour lecture time, and 1 hour practicals time.
  • Each student will be given remote access (username and password) to a linux host located in the cloud. They need to login to it to perform the practicals.
  • In the 1 hour practicals time, the student will be given 2-4 real-life problems that a cloud engineer would encounter on the job. The student will be asked to solve it using the knowledge obtained during the lecture time.
  • Each student will have access to course materials, problems and solutions.


  • At the end of the course, an exam will be conducted for a 2 hours duration.
  • The exam tests the technical skills and analytical thinking of the student.
Class Topic Details
1 Introduction
  • Networking in Linux.
  • Cybersecurity in Linux
  • Career options and job prospects.
2 Access control
  • Authentication and Authorization.
  • Users, groups and permissions.
  • Sudo
  • SE-Linux.
3 Cryptography I - Hashing, encryption and decryption
  • Security principles of Confidentiality, Integrity, Availability, Authenticity, Nonrepudiation
  • Symmetric and Asymmetric cryptography.
  • Hashing and digital signatures.
  • Encrypt file, directory and disk.
4 Cryptography II - Digital signatures and Digital certificates
  • Digital signatures and Digital certificates with gpg.
  • Public Key Infrastructure and Certificate authority.
5 Cryptography III - Email security
  • Email server and client.
  • Email Integrity and confidentiality with gpg.
6 Network I - Introduction to Computer Networks
  • OSI layers.
  • Internet protocols - IP, TCP, UDP, ICMP, HTTP.
  • IPv4 address space - public, private and local.
  • Server-Client model.
7 Network II - Configuration
  • Network interface.
  • DNS records and DNS lookup.
  • Host and users.
  • System time.
8 Network III - ssh
  • ssh, port forwarding
  • Configuring ssh server and ssh client
  • Passwordless login
  • ssh hardening
9 Network IV - File transfer and File sharing
  • File transfer protocol (ftp).
  • File transfer tools.
  • Repository model.
10 Network V - Firewall
  • Firewall operations - filter, NAT and drop packets.
  • Logging packets with firewall.
  • Debugging the firewall.
11 Network VI - Monitoring
  • Network monitoring tools - nmap, zabbix Packet inspection.
  • Device monitoring - CPU, RAM, Storage devices.
12 Network VII - Logging
  • Collecting and analyzing system logs for security and performance monitoring.
13 Network Application I - HTTP from command line
  • Introduction to the web and HTTP protocol.
  • Web technologies - server-side and client-side.
  • HTTP requests from the command line.
  • REST API concepts.
14 Network Application II - Web server
  • Static and Dynamic resources.
  • Install nginx and configure a virtualhost.
  • Secure web traffic with https.
15 Network Application III - Authentication
  • Basic authentication for network services.
  • Single sign on.
16 Network Application IV - Database with mysql
  • Introduction to database. Types of database.
  • SQL database for admins and developers.
  • Install and configure mysql database.
  • Database security and backup.
17 Network Application V - Proxy and Web firewall
  • Reverse proxy and forward proxy.
  • Load balancing with Haproxy.
  • Denial-of-Service (DoS) attacks and mitigation with Web.
  • Application Firewall (WAF).
18 Forensics and Incident Response
  • Understanding forensic analysis techniques for investigating security incidents.
  • Developing incident response plans and procedures.
19 Backup and recovery
  • Designing backup strategies. Implement backup and restore using shell scripts.
  • Disaster recovery planning and testing.
20 Security Audit and Compliance
  • Conducting security audits, compliance assessments.
  • Human factor in security.

About Course

  • Duration:40 Hours
  • 20 days of classes. Offered in a weekend batch
  • Lessons:20
  • Eligibility:Bachelor's Degree
  • Course codeLIN201
  • Course nameLinux in Networking and Cybersecurity in Cloud
  • Course descriptionAn introduction to networking and cybersecurity in Linux.
Buy This Course