Als führendes Aus- und Weiterbildungsunternehmen in den Bereichen IT- und Business Skills orientieren wir uns stark an technologischen Trends und an dem tatsächlichen Bedarf des Arbeitsmarktes. Voraussetzungen für eine Wettbewerbsfähigkeit mit Zunahme der Digitalisierung und dem technologischen Fortschritt ist qualifiziertes Fachpersonal. Seit 2011 unterstützen wir erfolgreich Unternehmen, Organisationen und Privatpersonen bei ihrer maßgeschneiderten Aus- und Weiterbildungsplanung.
Unsere ExpertInnen stehen Ihnen für Ihre Fragen jederzeit gerne zur Verfügung.
Werde ein Teil von uns in einem modernen Unternehmen mit spannenden Perspektiven.
Sie haben Fragen und wollen uns telefonisch oder per E-Mail kontaktieren? Für eine individuelle und persönliche Beratung stehen Ihnen unsere ExpertInnen gerne zur Verfügung. Wir freuen uns auf Ihre Kontaktaufnahme!
331.1 X.509 Certificates and Public Key Infrastructures
Description: Candidates should understand X.509 certificates and public key infrastructures. They should know how to configure and use OpenSSL to implement certification authorities and issue SSL certificates for various purposes.
331.2 X.509 Certificates for Encryption, Signing and Authentication
Description: Candidates should be able to use X.509 certificates for both server and client authentication. This includes implementing user and server authentication for Apache HTTPD. The version of Apache HTTPD covered is 2.4 or higher.
331.3 Encrypted File Systems
Description: Candidates should be able to set up and configure encrypted file systems.
331.4 DNS and Cryptography
Description: Candidates should have experience and knowledge of cryptography in the context of DNS and its implementation using BIND. The version of BIND covered is 9.7 or higher.
332.1 Host Hardening
Description: Candidates should be able to secure computers running Linux against common threats.
332.2 Host Intrusion Detection
Description: Candidates should be familiar with the use and configuration of common host intrusion detection software. This includes managing the Linux Audit system and verifying a system's integrity.
332.3 Resource Control
Description: Candidates should be able to restrict the resources services and programs can consume.
Topic 333: Access Control
333.1 Discretionary Access Control
Description: Candidates should understand discretionary access control (DAC) and know how to implement it using access control lists (ACL). Additionally, candidates are required to understand and know how to use extended attributes.
333.2 Mandatory Access Control
Description: Candidates should be familiar with mandatory access control (MAC) systems for Linux. Specifically, candidates should have a thorough knowledge of SELinux. Also, candidates should be aware of other mandatory access control systems for Linux. This includes major features of these systems but not configuration and use.
334.1 Network
Description: Candidates should be able to secure networks against common threats. This includes analyzing network traffic of specific nodes and protocols.
334.2 Network Intrusion Detection
Description: Candidates should be familiar with the use and configuration of network security scanning, network monitoring and network intrusion detection software. This includes updating and maintaining the security scanners.
334.3 Packet Filtering
Description: Candidates should be familiar with the use and configuration of the netfilter Linux packet filter.
334.4 Virtual Private Networks
Description: Candidates should be familiar with the use of OpenVPN, IPsec and WireGuard to set up remote access and site to site VPNs.
335.1 Common Security Vulnerabilities and Threats
Description: Candidates should understand the principle of major types of security vulnerabilities and threats.
335.2 Penetration Testing
Description: Candidates understand the concepts of penetration testing, including an understand of commonly used penetration testing tools. Furthermore, candidates should be able to use nmap to verify the effectiveness of network security measures.
Personen, die sich gezielt auf die LPIC3-Security Zertifizierung vorbereiten wollen.
Aktive LPIC-2-Zertifizierung, um die LPIC-3-Zertifizierung erhalten zu können.
LPIC-3 Examen: 303-300
Alle Preise zzgl. MwSt.
Ihr individuelles Kursangebot
Unverbindlich herunterladen
Services zu Ihrem Seminar
Erhalten Sie bei unseren kostenlosen Infoveranstaltungen einen Überblick über Ablauf, Inhalte und Zielsetzungen Ihrer geplanten Weiterbildung und erfahren Sie, welche Karriere-Chancen sich nach Lehrgangsabschluss im Berufsleben ergeben können. Sie treffen bei dieser Online-Veranstaltung bereits auf Ihre/n Lehrgangsleiter:in und haben die Möglichkeit Ihre Fragen persönlich zu stellen, um besser abschätzen zu können, ob der Lehrgang zu Ihren persönlichen Anforderungen passt.
331.1 X.509 Certificates and Public Key Infrastructures
Description: Candidates should understand X.509 certificates and public key infrastructures. They should know how to configure and use OpenSSL to implement certification authorities and issue SSL certificates for various purposes.
331.2 X.509 Certificates for Encryption, Signing and Authentication
Description: Candidates should be able to use X.509 certificates for both server and client authentication. This includes implementing user and server authentication for Apache HTTPD. The version of Apache HTTPD covered is 2.4 or higher.
331.3 Encrypted File Systems
Description: Candidates should be able to set up and configure encrypted file systems.
331.4 DNS and Cryptography
Description: Candidates should have experience and knowledge of cryptography in the context of DNS and its implementation using BIND. The version of BIND covered is 9.7 or higher.
332.1 Host Hardening
Description: Candidates should be able to secure computers running Linux against common threats.
332.2 Host Intrusion Detection
Description: Candidates should be familiar with the use and configuration of common host intrusion detection software. This includes managing the Linux Audit system and verifying a system's integrity.
332.3 Resource Control
Description: Candidates should be able to restrict the resources services and programs can consume.
Topic 333: Access Control
333.1 Discretionary Access Control
Description: Candidates should understand discretionary access control (DAC) and know how to implement it using access control lists (ACL). Additionally, candidates are required to understand and know how to use extended attributes.
333.2 Mandatory Access Control
Description: Candidates should be familiar with mandatory access control (MAC) systems for Linux. Specifically, candidates should have a thorough knowledge of SELinux. Also, candidates should be aware of other mandatory access control systems for Linux. This includes major features of these systems but not configuration and use.
334.1 Network
Description: Candidates should be able to secure networks against common threats. This includes analyzing network traffic of specific nodes and protocols.
334.2 Network Intrusion Detection
Description: Candidates should be familiar with the use and configuration of network security scanning, network monitoring and network intrusion detection software. This includes updating and maintaining the security scanners.
334.3 Packet Filtering
Description: Candidates should be familiar with the use and configuration of the netfilter Linux packet filter.
334.4 Virtual Private Networks
Description: Candidates should be familiar with the use of OpenVPN, IPsec and WireGuard to set up remote access and site to site VPNs.
335.1 Common Security Vulnerabilities and Threats
Description: Candidates should understand the principle of major types of security vulnerabilities and threats.
335.2 Penetration Testing
Description: Candidates understand the concepts of penetration testing, including an understand of commonly used penetration testing tools. Furthermore, candidates should be able to use nmap to verify the effectiveness of network security measures.
Personen, die sich gezielt auf die LPIC3-Security Zertifizierung vorbereiten wollen.
Aktive LPIC-2-Zertifizierung, um die LPIC-3-Zertifizierung erhalten zu können.
Hat Ihnen dieser Kurs gefallen?
Teilen Sie ihn gerne mit anderen, die ebenfalls von den vermittelten Inhalten profitieren könnten. Nutzen Sie die sozialen Netzwerke, um den Kurs bekannt zu machen und eine größere Zielgruppe zu erreichen. Ihr Engagement hilft, wertvolles Wissen weiterzugeben. Klicken Sie einfach auf die untenstehenden Social-Media-Schaltflächen, um den Kurs mit Ihrem Netzwerk zu teilen.
tecTrain GmbH (Headquarter)
Sankt-Peter-Gürtel 10b
8042 Graz
Wien – Graz – Linz
© 2025 tecTrain GmbH - Alle Rechte vorbehalten