Modal content here…
Systems security forms a foundational layer of digital infrastructure, providing the critical defences that protect operating systems, and applications from attacks. These Hacktivity labs offer a hands-on approach to defensive security techniques, with a particular emphasis on Unix and Linux environments where participants can explore practical applications of security theory. Through guided scenarios and interactive challenges, learners will develop both theoretical understanding and practical experience in implementing robust security controls, from basic authentication mechanisms to containerisation and mandatory access control systems. The practical exercises are designed to bridge the gap between security principles and real-world implementation, enabling participants to not only configure and audit security defences but also apply offensive techniques to test their effectiveness, ultimately preparing them to design and operate secure systems in professional cyber security roles. Topics covered include: operating system security models, user authentication and access control, sandboxing, and virtualisation. You can expect lots of hands-on opportunities to apply security theory, and you will develop your familiarity with Unix, free open source software, and advanced Linux security mechanisms.
The practical labs cover various aspects of system security with an emphasis on Unix/Linux environments. The Authentication lab
delves into user identity verification, password storage, and cracking techniques, providing hands-on experience to understand authentication processes. The Pluggable Authentication Modules lab
explores PAM and SSH, enhancing knowledge of authentication flexibility and security in Linux. The Access Controls lab
focuses on Unix file permissions, inodes, and directory-level permissions, offering practical skills in managing access rights. The Set User ID lab
delves into SUID and SGID, explaining their role in privilege escalation and providing practical experience in working with SUID programs. The Access Control Lists (ACLs) lab
introduces ACLs, allowing granular control over resource access, with tasks involving Linux ACLs and comparison with Windows ACLs. Lastly, the Containers lab
and AppArmor lab
cover container-based sandboxes, Docker, capabilities, and AppArmor, exploring methods to restrict program capabilities and enforce access controls. The labs include Hackerbot challenges, lectures, and readings for a comprehensive learning experience.
Runs for 12 days (until )
As you complete challenges and watch videos, you will gain Knowledge Area XP. Register to track your KA XP