YoVDO

Linux Security and Hardening Essential Training

Offered By: LinkedIn Learning

Tags

Linux Courses Linux Security Courses Disk Encryption Courses

Course Description

Overview

Discover how to tighten security on any Linux system. Learn basic security concepts and guidelines that can help Linux system administrators keep their system safe from attackers.

Syllabus

Introduction
  • Welcome
1. General Security
  • General security
  • Is Linux secure?
  • What makes Linux secure?
  • Security guidelines and principles
  • Section summary: General security
2. Physical Security
  • Physical security
  • Physical security concepts
  • Single user mode security
  • Single user mode and blank passwords
  • Secure the bootloader
  • Disk encryption
  • Encrypt a new device: Part 1
  • Encrypt a new device: Part 2
  • Encrypt an existing device
  • Disable Control-Alt-Delete
  • Section summary: Physical security
3. Account Security
  • Account security
  • Introduction to PAM
  • PAM configuration example
  • Password security
  • Account security: Demo 1 (UID 0)
  • Control account access
  • Security by account type
  • Account security: Demo 2
  • Account security: Demo 3 (Sudo)
4. Network Security
  • Network security
  • Network security: Part 1
  • Network security: Part 2
  • Secure SSHD: Part 1
  • Secure SSHD: Part 2
  • Linux firewall fundamentals
  • Configure the firewall from the command line
  • Firewall rule specifications
  • Example firewall rules
  • Linux firewall demo
  • TCP Wrappers: Part 1
  • TCP Wrappers: Part 2
5. File System Security
  • File system security
  • Introduction to file and directory permissions
  • File and directory permissions: Part 1
  • File and directory permissions: Part 2
  • Special modes: Part 1
  • Special modes: Part 2
  • File attributes
  • File attributes demo
  • ACLs
  • ACLs demo
  • Rootkits
  • Rootkit hunter demo
Conclusion
  • Summary

Taught by

Jason Cannon

Related Courses

Linux Server Management and Security
University of Colorado System via Coursera
Cybersecurity Roles, Processes & Operating System Security
IBM via Coursera
Operating Systems and Security
IBM via edX
Linux Security and Hardening, The Practical Security Guide.
Udemy
The Complete Cyber Security Course : Hackers Exposed!
Udemy