Complete Linux Security & Hardening with Practical Examples
If you have basic understanding of Linux and want to enhance your skill in Linux security and system hardening then this course is perfect fit for you. Many security policies and standards require system administrators to address specific user authentication concerns, application of updates, system auditing and logging, file system integrity, and more. This course provides strategies for addressing specific policy and configuration concerns.
This course is intended to develop the skills needed to ensure data integrity on computer systems for organizations with high security standards.
Course Curriculum
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
- Welcome to Section 4 (0:09)
- Understanding etc.passwd file (10:09)
- Understanding etc.group file (5:42)
- Understanding etc.shadow file (6:54)
- The etc.login.defs File (5:36)
- Creating User Account and Changing Password (8:47)
- Change Password Parameters (8:25)
- Set Password Policy (12:21)
- Lock or Disable User Accounts (7:28)
- Lock or Disable User Accounts Manually (7:06)
- Lock User Account After 3 Failed Attempts (9:08)
- Restrict Direct “root” Login (7:49)
- Disable SSH Access for a Specific User (5:31)
- ulimit (14:08)
- Implement UIDGID Policy (7:31)
- Centralized Authentication Service or Directory Services (5:13)
- sudo Access (19:22)
- Monitor User Activity (21:59)
- Linux Security Quiz 3
- Handouts
- Homework
Available in
days
days
after you enroll
- Welcome to PAM (0:06)
- What is PAM (9:12)
- The Importance of PAM (4:06)
- The PAM File Configuration Format (4:41)
- The PAM File Configuration - Module Interface (5:19)
- Account Access Through PAM (1:34)
- The PAM Configuration File – Control Flags (3:11)
- The PAM Configuration File – Modules (SO) (10:35)
- PAM Aware Services and Stacks (7:39)
- Linux Security Quiz 4
- Handouts
- Homework
Available in
days
days
after you enroll
Available in
days
days
after you enroll
- Welcome to Securing Linux System (0:09)
- Message of the Day (motd) (7:30)
- Customize Message of the Day (10:36)
- Physical Server Security (4:22)
- Remove Un-necessary or Orphan Packages (11:54)
- Keep Kernel and System Up to Date (12:20)
- Stop and Disable Unwanted Services (15:28)
- Separate Disk Partition (6:21)
- Disable Alt+Ctrl+Del (8:43)
- One Service Per Server (4:41)
- Change Default Console Password (5:01)
- Disable USB Stick Detection (2:26)
- Network Time Protocol (15:40)
- Lockdown Cronjobs (7:09)
- Change SSH Port (8:54)
- SELinux (35:35)
- System Backup (7:12)
- System Upgrade and Patch Management (8:41)
- Linux Security Quiz 6
- Handouts
- Homework
Available in
days
days
after you enroll
- Welcome to Securing Linux Network (0:09)
- Introduction to Firewall (4:22)
- Firewall (iptables – tables, chains and targets) (10:49)
- Linux Firewall (iptables – practical examples) (24:09)
- Firewall (firewalld) (8:53)
- Firewall (firewalld – Practical Examples) (23:35)
- Firewall (firewalld GUI) (5:09)
- Encrypt Incoming and Outgoing Traffic (3:50)
- SSH vs. TELNET (10:08)
- Turn Off ipv6 (6:25)
- NIC Bonding (17:42)
- Linux Security Quiz 7
- Handouts
- Homework
Available in
days
days
after you enroll
Available in
days
days
after you enroll
- Welcome to Addtinal Resources (0:09)
- Getting Linux Commands Help (5:02)
- Talking to Users (8:30)
- File Transfer Commands (10:25)
- Compress and Uncompress Files (9:42)
- System Log Monitoring (11:08)
- Advance Package Management (15:01)
- sed Command (21:00)
- NIC Bonding (17:42)
- User Directory Authentication (5:50)
- Changing password (4:36)
- Difference AD, openLDAP, WinBind etc. (8:34)
- Recover Root Password (5:26)
- File System Check (16:43)
Check your inbox to confirm your subscription