YoVDO

Linux Security and Hardening Essential Training

Offered By: LinkedIn Learning

Tags

Linux Courses Linux Security Courses Disk Encryption Courses

Course Description

Overview

Discover how to tighten security on any Linux system. Learn basic security concepts and guidelines that can help Linux system administrators keep their system safe from attackers.

Syllabus

Introduction
  • Welcome
1. General Security
  • General security
  • Is Linux secure?
  • What makes Linux secure?
  • Security guidelines and principles
  • Section summary: General security
2. Physical Security
  • Physical security
  • Physical security concepts
  • Single user mode security
  • Single user mode and blank passwords
  • Secure the bootloader
  • Disk encryption
  • Encrypt a new device: Part 1
  • Encrypt a new device: Part 2
  • Encrypt an existing device
  • Disable Control-Alt-Delete
  • Section summary: Physical security
3. Account Security
  • Account security
  • Introduction to PAM
  • PAM configuration example
  • Password security
  • Account security: Demo 1 (UID 0)
  • Control account access
  • Security by account type
  • Account security: Demo 2
  • Account security: Demo 3 (Sudo)
4. Network Security
  • Network security
  • Network security: Part 1
  • Network security: Part 2
  • Secure SSHD: Part 1
  • Secure SSHD: Part 2
  • Linux firewall fundamentals
  • Configure the firewall from the command line
  • Firewall rule specifications
  • Example firewall rules
  • Linux firewall demo
  • TCP Wrappers: Part 1
  • TCP Wrappers: Part 2
5. File System Security
  • File system security
  • Introduction to file and directory permissions
  • File and directory permissions: Part 1
  • File and directory permissions: Part 2
  • Special modes: Part 1
  • Special modes: Part 2
  • File attributes
  • File attributes demo
  • ACLs
  • ACLs demo
  • Rootkits
  • Rootkit hunter demo
Conclusion
  • Summary

Taught by

Jason Cannon

Related Courses

Introduction to Linux
Linux Foundation via edX
操作系统原理(Operating Systems)
Peking University via Coursera
Internet of Things: Setting Up Your DragonBoard™ Development Platform
University of California, San Diego via Coursera
Information Security-3
Indian Institute of Technology Madras via Swayam
Introduction to Embedded Systems Software and Development Environments
University of Colorado Boulder via Coursera