Featured resource
2025 Tech Upskilling Playbook
Tech Upskilling Playbook

Build future-ready tech teams and hit key business milestones with seven proven plays from industry leaders.

Check it out
  • Lab
    • Libraries: If you want this lab, consider one of these libraries.
    • Cloud
    • Security
Google Cloud Platform icon
Labs

Linux Kernel Security

Many important security configurations can be set using kernel parameters. In this hands-on lab, we will learn how to find and modify these parameters using various utilities. These skills are essential for passing advanced security certification exams such as the LPIC 303-200 exam.

Google Cloud Platform icon
Lab platform
Lab Info
Level
Advanced
Last updated
Sep 09, 2025
Duration
30m

Contact sales

By filling out this form and clicking submit, you acknowledge our privacy policy.
Table of Contents
  1. Challenge

    Create a Text File for the Kernel Parameters
    1. Run the following command:
    touch /home/cloud_user/investigate.txt
    
  2. Challenge

    Install the Kernel Documentation
    1. Run the following command:
    sudo yum install kernel-doc
    
  3. Challenge

    Find and Document the Value of the `randomize_va_space` Parameter
    1. View the value of the randomize_va_space parameter by running the following command:
    sysctl -ar randomize_va
    
    1. Add the value to the investigate.txt file.
    sysctl -ar randomize_va >> investigate.txt
    
  4. Challenge

    Find and Document the Values of All ICMP Kernel Parameters
    1. Run the following command:
    sysctl –ar icmp >> investigate.txt
    
  5. Challenge

    Temporarily Disable ICMP Using a Kernel Parameter
    1. Run the following command:
    sudo sysctl –w net.ipv4.icmp_echo_ignore_all=1
    
  6. Challenge

    Find and Document the Current Kernel Security Limits
    1. View the contents of /etc/security/limits.conf.
    vim /etc/security/limits.conf
    
    1. Write the contents of /etc/security/limits.conf to investigate.txt.
    cat /etc/security/limits.conf >> investigate.txt
    
    1. Locate the current security limits for cloud_user.
    ulimit -a
    
    1. Write the output of the ulimit -a command to investigate.txt.
    ulimit -a >> investigate.txt
    
About the author

Pluralsight Skills gives leaders confidence they have the skills needed to execute technology strategy. Technology teams can benchmark expertise across roles, speed up release cycles and build reliable, secure products. By leveraging our expert content, skill assessments and one-of-a-kind analytics, keep up with the pace of change, put the right people on the right projects and boost productivity. It's the most effective path to developing tech skills at scale.

Real skill practice before real-world application

Hands-on Labs are real environments created by industry experts to help you learn. These environments help you gain knowledge and experience, practice without compromising your system, test without risk, destroy without fear, and let you learn from your mistakes. Hands-on Labs: practice your skills before delivering in the real world.

Learn by doing

Engage hands-on with the tools and technologies you’re learning. You pick the skill, we provide the credentials and environment.

Follow your guide

All labs have detailed instructions and objectives, guiding you through the learning process and ensuring you understand every step.

Turn time into mastery

On average, you retain 75% more of your learning if you take time to practice. Hands-on labs set you up for success to make those skills stick.

Get started with Pluralsight