COURSE: INTRODUCTION TO LINUX SECURITY MODELS
OBJECTIVES
REQUIREMENTS
MODULE 1: OPERATING SYSTEM SECURITIES
MODULE 2: FIREWALL
MODULE 3: SQUID PROXY SERVER
Outlines
Learning Objectives
Introduction
Why Cache?
Supported Protocol
Hardware Spesification
Hands On Session
Quiz
ADDITIONAL RESOURCE : OPEN SOURCE/FREE SECURITY TOOLS
CONTRIBUTORS
Outlines
Learning Objectives
Introduction to squid proxy server
Installing Squid
Configure Squid
Running, Testing and Stopping Squid daemon
Configure Proxy Client
Filtering Data using squid
« Previous
|
Next »