YoVDO

Linux Security and Hardening Essential Training

Offered By: LinkedIn Learning

Tags

Linux Courses Linux Security Courses Disk Encryption Courses

Course Description

Overview

Discover how to tighten security on any Linux system. Learn basic security concepts and guidelines that can help Linux system administrators keep their system safe from attackers.

Syllabus

Introduction
  • Welcome
1. General Security
  • General security
  • Is Linux secure?
  • What makes Linux secure?
  • Security guidelines and principles
  • Section summary: General security
2. Physical Security
  • Physical security
  • Physical security concepts
  • Single user mode security
  • Single user mode and blank passwords
  • Secure the bootloader
  • Disk encryption
  • Encrypt a new device: Part 1
  • Encrypt a new device: Part 2
  • Encrypt an existing device
  • Disable Control-Alt-Delete
  • Section summary: Physical security
3. Account Security
  • Account security
  • Introduction to PAM
  • PAM configuration example
  • Password security
  • Account security: Demo 1 (UID 0)
  • Control account access
  • Security by account type
  • Account security: Demo 2
  • Account security: Demo 3 (Sudo)
4. Network Security
  • Network security
  • Network security: Part 1
  • Network security: Part 2
  • Secure SSHD: Part 1
  • Secure SSHD: Part 2
  • Linux firewall fundamentals
  • Configure the firewall from the command line
  • Firewall rule specifications
  • Example firewall rules
  • Linux firewall demo
  • TCP Wrappers: Part 1
  • TCP Wrappers: Part 2
5. File System Security
  • File system security
  • Introduction to file and directory permissions
  • File and directory permissions: Part 1
  • File and directory permissions: Part 2
  • Special modes: Part 1
  • Special modes: Part 2
  • File attributes
  • File attributes demo
  • ACLs
  • ACLs demo
  • Rootkits
  • Rootkit hunter demo
Conclusion
  • Summary

Taught by

Jason Cannon

Related Courses

Securing Windows Server 2016: Server Hardening Solutions
LinkedIn Learning
Administer infrastructure resources in Azure
Microsoft via Microsoft Learn
Implement virtual machine host security in Azure
Microsoft via Microsoft Learn
Import and Export Data to Microsoft Azure
Pluralsight
The Complete Cyber Security Course : End Point Protection!
Udemy