Certificacion Internacional LPIC-3 303 Security

LPIC-3 303 International Security Certification

This training is designed for Linux professionals seeking top-tier enterprise-level certification. Internationally accredited by the Linux Professional Institute (LPI), it validates advanced competencies in cryptography, network security, access control, and system hardening. It is offered in-pers…

60 hours
Official Certificate
Expert Instructors
Online Learning
Certificación internacional LPIC-3 303 Security
Linux LPIC logo

This training is designed for Linux professionals seeking top-tier enterprise-level certification. Internationally accredited by the Linux Professional Institute (LPI), it validates advanced competencies in cryptography, network security, access control, and system hardening.

It is offered in-person in Bogotá or live online.

Upon completing the course, participants will be able to:

  • Implement cryptography and PKI systems in Linux environments
  • Secure hosts through system hardening, authentication, and threat detection
  • Configure advanced access control policies
  • Harden networks using firewalls, IDS, and VPN technologies
  • Pass the international LPIC‑3 Security certification exam

To participate in this training, attendees must meet the following requirements:

  • Completion of the training programs for the International LPI-1 and LPI-2 Certifications

Certificación internacional LPIC-3 303 Security Applies
Certificación internacional LPIC-3 303 Security 60 hours

Learning Methodology

The learning methodology, regardless of the modality (in-person or remote), is based on the development of workshops or labs that lead to the construction of a project, emulating real activities in a company.

The instructor (live), a professional with extensive experience in work environments related to the topics covered, acts as a workshop leader, guiding students' practice through knowledge transfer processes, applying the concepts of the proposed syllabus to the project.

The methodology seeks that the student does not memorize, but rather understands the concepts and how they are applied in a work environment.

As a result of this work, at the end of the training the student will have gained real experience, will be prepared for work and to pass an interview, a technical test, and/or achieve higher scores on international certification exams.

Conditions to guarantee successful results:
  • a. An institution that requires the application of the model through organization, logistics, and strict control over the activities to be carried out by the participants in each training session.
  • b. An instructor located anywhere in the world, who has the required in-depth knowledge, expertise, experience, and outstanding values, ensuring a very high-level knowledge transfer.
  • c. A committed student, with the space, time, and attention required by the training process, and the willingness to focus on understanding how concepts are applied in a work environment, and not memorizing concepts just to take an exam.

Pre-enrollment

You do not need to pay to pre-enroll. By pre-enrolling, you reserve a spot in the group for this course or program. Our team will contact you to complete your enrollment.

Pre-enroll now

Infinity Payments

Make your payment quickly, safely and reliably


- For bank transfer payments, request the details by email capacita@aulamatriz.edu.co.

- If you wish to finance your payment through our credit options
(Sufi, Cooperativa Unimos or Fincomercio), click on the following link:
Ver opciones de crédito.

To continue you must
Or if you don't have an account you must

Description

This training is designed for Linux professionals seeking top-tier enterprise-level certification. Internationally accredited by the Linux Professional Institute (LPI), it validates advanced competencies in cryptography, network security, access control, and system hardening.

It is offered in-person in Bogotá or live online.

Objectives

Upon completing the course, participants will be able to:

  • Implement cryptography and PKI systems in Linux environments
  • Secure hosts through system hardening, authentication, and threat detection
  • Configure advanced access control policies
  • Harden networks using firewalls, IDS, and VPN technologies
  • Pass the international LPIC‑3 Security certification exam

To participate in this training, attendees must meet the following requirements:

  • Completion of the training programs for the International LPI-1 and LPI-2 Certifications

offers

Certificación internacional LPIC-3 303 Security Applies
Certificación internacional LPIC-3 303 Security 60 hours

Learning Methodology

The learning methodology, regardless of the modality (in-person or remote), is based on the development of workshops or labs that lead to the construction of a project, emulating real activities in a company.

The instructor(live), a professional with extensive experience in work environments related to the topics covered, acts as a workshop leader, guiding students' practice through knowledge transfer processes, applying the concepts of the proposed syllabus to the project.

La metodología persigue que el estudiante "does not memorize", but rather "understands" the concepts and how they are applied in a work environment."

As a result of this work, at the end of the training the student will have gained real experience, will be prepared for work and to pass an interview, a technical test, and/or achieve higher scores on international certification exams.

Conditions to guarantee successful results:
  • a. An institution that requires the application of the model through organization, logistics, and strict control over the activities to be carried out by the participants in each training session.
  • b. An instructor located anywhere in the world, who has the required in-depth knowledge, expertise, experience, and outstanding values, ensuring a very high-level knowledge transfer.
  • c. A committed student, with the space, time, and attention required by the training process, and the willingness to focus on understanding how concepts are applied in a work environment, and not memorizing concepts just to take an exam.

Course Modules

Module 1: Cryptography and PKI in Linux

  • Fundamentals of symmetric and asymmetric cryptography.

  • X.509 certificates, PKCS, and OpenSSL.

  • Generation and management of digital certificates.

  • Creation of an internal Certificate Authority (CA).

  • Encryption and signing of data with GPG and OpenSSL.

  • File and disk encryption (LUKS, eCryptfs, GnuPG).

  • Principles of hardening Linux servers.

  • Removal of unnecessary services and port scanning.

  • Password policies, account locking, and secure login.

  • Protection of critical processes, files, and directories.

  • Use of tools such as chkrootkit, rkhunter, aide.

  • Discretionary Access Control (DAC) and Mandatory Access Control (MAC).

  • Fundamentals and configuration of SELinux.

  • Operation modes: enforcing, permissive, disabled.

  • Use of commands semanage, chcon, restorecon.

  • Introduction and configuration of AppArmor.

  • Security policies and auditing in hardened Linux environments.

  • Encryption and traffic control with OpenVPN, SSH, IPSec.

  • Secure configuration of services: DNS, FTP, email, HTTP.

  • Advanced use of iptables and nftables.

  • FirewallD and zone policies.

  • Site-to-site VPNs and encrypted remote access.

  • Tools for traffic monitoring and intrusion detection.

  • Identification of common threats (MITM, DDoS, rootkits).

  • Port and vulnerability scanning with Nmap, Nikto, OpenVAS.

  • System log analysis and anomaly detection.

  • Basic pen testing and use of forensic tools.

  • Application of security updates and risk mitigation.

  • Securing services such as Apache, Postfix, SSH, and Samba.

  • Database hardening practices (MySQL/PostgreSQL).

  • Configuration of security policies for shared services.

  • Monitoring application integrity.

  • Application of SSL/TLS certificates for web services.

  • Configuration of a complete secure business environment.

  • Integration of PKI, firewalls, VPNs, and SELinux/AppArmor.

  • Simulation of attacks and evaluation of the system's response.

  • Resolution of practical cases and review similar to exam 303-300.