COURSE: INTRODUCTION TO LINUX SECURITY MODELS
OBJECTIVES
REQUIREMENTS
MODULE 1: OPERATING SYSTEM SECURITIES
MODULE 2: FIREWALL
MODULE 3: SQUID PROXY SERVER
Outlines
Learning Objectives
Introduction
Why Cache?
Supported Protocol
Hardware Spesification
Hands On Session
Installing Squid
Configure Squid
Running, Testing and Stopping Squid
Configure Proxy Client
Filtering Data using Squid
Quiz
ADDITIONAL RESOURCE : OPEN SOURCE/FREE SECURITY TOOLS
CONTRIBUTORS
Hands On Session
« Previous
|
Next »