Cademy logoCademy Marketplace

Course Images

Linux Security and Hardening, The Practical Security Guide

Linux Security and Hardening, The Practical Security Guide

🔥 Limited Time Offer 🔥

Get a 10% discount on your first order when you use this promo code at checkout: MAY24BAN3X

  • 30 Day Money Back Guarantee
  • Completion Certificate
  • 24/7 Technical Support

Highlights

  • On-Demand course

  • 4 hours 15 minutes

  • All levels

Description

Secure any Linux server from hackers and protect it against hacking. The practical Linux Administration security guide.

Keep yourself and your company out of the news by protecting your Linux systems from hackers, crackers, and attackers! This course will not only teach you the security concepts and guidelines that will keep your Linux servers safe, it will walk you through hardening measures step-by-step. By the end of this course, you will be able to tighten up the security on any Linux system. You'll learn the security weaknesses of the Linux operating system and will be given step-by-step instructions on how to protect those weaknesses. You'll even learn some security concepts that apply to information security as a whole while focusing on Linux-specific issues that require special consideration. What you learn in this course applies to any Linux environment or distribution including Ubuntu, Debian, Linux Mint, RedHat, CentOS, Fedora, OpenSUSE, Slackware, Kali Linux, and more.

What You Will Learn

How to protect your Linux systems against hackers.
Ways to prevent attackers from breaking into your systems, even when they have physical access to your machine.
How to enforce strong password policies and control password as well as account aging policies on your Linux servers.
SSH Hardening practices.
Network security tactics.
Port scanning and network service detection.
How the Linux firewall works and exactly how to configure it.
How to protect the superuser (root) account.
Ways to share accounts securely with an audit trail.
File system security and encryption.
Using and configuring sudo, and why you need to.
Advanced Linux permissions, including special modes, file attributes, and access control lists (ACLs).

Audience

This course targets anyone with a desire to learn how to secure and harden a computer running the Linux operating system. Linux system administrators looking to make the systems they support more secure and people thinking about a career as a Linux system administrator or engineer will benefit from this course. This course is not for people who have never used the Linux operating system before.

Approach

In this course we not only teach you the security concepts and guidelines that will keep your Linux servers safe, but we also will walk you through hardening measures step-by-step.

Key Features

You will be able to harden a Linux system, reduce its surface of vulnerability, and reduce the risk of your Linux system being hacked or compromised.

Github Repo

https://github.com/packtpublishing/linux-security-and-hardening-the-practical-security-guide

About the Author

Jason Cannon

Jason Cannon is a professional system administrator, consultant, and author. He started his career as a Unix and Linux System engineer in 1999. Since that time, he has utilized his Linux skills at companies such as Xerox, UPS, Hewlett-Packard, and Amazon.com. Additionally, he has acted as a technical consultant and independent contractor for small businesses and Fortune 500 companies. Jason has professional experience with CentOS, RedHat Enterprise Linux, SUSE Linux Enterprise Server, and Ubuntu. He has used several Linux distributions on personal projects including Debian, Slackware, CrunchBang, and others. In addition to Linux, Jason has experience supporting proprietary Unix operating systems including AIX, HP-UX, and Solaris. He enjoys teaching others how to use and exploit the power of the Linux operating system.

Course Outline

1. Course Overview and Downloads

1. Course Overview

Course Overview and Downloads: Course Overview


2. General Security

1. Section Overview

General Security: Section Overview

2. Is Linux Secure?

General Security: Is Linux Secure?

3. What Makes Linux Secure?

General Security: What Makes Linux Secure?

4. Security Guidelines and Principles

General Security: Security Guidelines and Principles

5. Section Summary

General Security: Section Summary


3. Physical Security

1. Section Overview

Physical Security: Section Overview

2. Physical Security Concepts

Physical Security: Physical Security Concepts

3. Single User Mode Security

Physical Security: Single User Mode Security

4. Single User Mode and Blank Passwords

Physical Security: Single User Mode and Blank Passwords

5. Securing the Boot Loader

Physical Security: Securing the Boot Loader

6. Disk Encryption

Physical Security: Disk Encryption

7. Encrypting a New Device, Part I

Physical Security: Encrypting a New Device, Part I

8. Encrypting a New Device, Part II

Physical Security: Encrypting a New Device, Part II

9. Encrypting an Existing Device

Physical Security: Encrypting an Existing Device

10. Disabling Control Alt Delete

Physical Security: Disabling Control Alt Delete

11. Section Summary

Physical Security: Section Summary


4. Account Security

1. Section Overview

Account Security: Section Overview

2. Intro to PAM

Account Security: Intro to PAM

3. PAM Configuration Example

Account Security: PAM Configuration Example

4. Password Security

Account Security: Password Security

5. Account Security Demo #1 (UID 0)

Account Security: Account Security Demo #1 (UID 0)

6. Controlling Account Access

Account Security: Controlling Account Access

7. Security by Account Type

Account Security: Security by Account Type

8. Account Security Demo #2

Account Security: Account Security Demo #2

9. Account Security Demo #3 (Sudo)

Account Security: Account Security Demo #3 (Sudo)


5. Network Security

1. Section Overview

Network Security: Section Overview

2. Network Security, Part I

Network Security: Network Security, Part I

3. Network Security, Part II

Network Security: Network Security, Part II

4. Securing SSHD, Part I

Network Security: Securing SSHD, Part I

5. Securing SSHD, Part II

Network Security: Securing SSHD, Part II

6. Linux Firewall Fundamentals

Network Security: Linux Firewall Fundamentals

7. Configuring the Firewall from the Command Line

Network Security: Configuring the Firewall from the Command Line

8. Firewall Rule Specifications

Network Security: Firewall Rule Specifications

9. Example Firewall Rules

Network Security: Example Firewall Rules

10. Linux Firewall Demonstration

Network Security: Linux Firewall Demonstration

11. TCP Wrappers, Part I

Network Security: TCP Wrappers, Part I

12. TCP Wrappers, Part II

Network Security: TCP Wrappers, Part II


6. File System Security

1. Section Overview

File System Security: Section Overview

2. File and Directory Permissions, Intro

File System Security: File and Directory Permissions, Intro

3. File and Directory Permissions, Part I

File System Security: File and Directory Permissions, Part I

4. File and Directory Permissions, Part II

File System Security: File and Directory Permissions, Part II

5. Special Modes, Part I

File System Security: Special Modes, Part I

6. Special Modes, Part II

File System Security: Special Modes, Part II

7. File Attributes

File System Security: File Attributes

8. File Attributes Demo

File System Security: File Attributes Demo

9. ACLs

File System Security: ACLs

10. ACLs Demo

File System Security: ACLs Demo

11. Rootkits

File System Security: Rootkits

12. Rootkit Hunter Demonstration

File System Security: Rootkit Hunter Demonstration


7. Additional Security Resources

1. Additional Security Resources

Additional Security Resources: Additional Security Resources

Course Content

  1. Linux Security and Hardening, The Practical Security Guide

About The Provider

Packt
Packt
Birmingham
Founded in 2004 in Birmingham, UK, Packt’s mission is to help the world put software to work in new ways, through the delivery of effective learning and i...
Read more about Packt

Tags

Reviews