Linux Security and Hardening Essential Training
Offered By: LinkedIn Learning
Course Description
Overview
Discover how to tighten security on any Linux system. Learn basic security concepts and guidelines that can help Linux system administrators keep their system safe from attackers.
Syllabus
Introduction
- Welcome
- General security
- Is Linux secure?
- What makes Linux secure?
- Security guidelines and principles
- Section summary: General security
- Physical security
- Physical security concepts
- Single user mode security
- Single user mode and blank passwords
- Secure the bootloader
- Disk encryption
- Encrypt a new device: Part 1
- Encrypt a new device: Part 2
- Encrypt an existing device
- Disable Control-Alt-Delete
- Section summary: Physical security
- Account security
- Introduction to PAM
- PAM configuration example
- Password security
- Account security: Demo 1 (UID 0)
- Control account access
- Security by account type
- Account security: Demo 2
- Account security: Demo 3 (Sudo)
- Network security
- Network security: Part 1
- Network security: Part 2
- Secure SSHD: Part 1
- Secure SSHD: Part 2
- Linux firewall fundamentals
- Configure the firewall from the command line
- Firewall rule specifications
- Example firewall rules
- Linux firewall demo
- TCP Wrappers: Part 1
- TCP Wrappers: Part 2
- File system security
- Introduction to file and directory permissions
- File and directory permissions: Part 1
- File and directory permissions: Part 2
- Special modes: Part 1
- Special modes: Part 2
- File attributes
- File attributes demo
- ACLs
- ACLs demo
- Rootkits
- Rootkit hunter demo
- Summary
Taught by
Jason Cannon
Related Courses
Securing Windows Server 2016: Server Hardening SolutionsLinkedIn Learning Administer infrastructure resources in Azure
Microsoft via Microsoft Learn Implement virtual machine host security in Azure
Microsoft via Microsoft Learn Import and Export Data to Microsoft Azure
Pluralsight The Complete Cyber Security Course : End Point Protection!
Udemy