banner

Stone River Elearning – Linux Security and Hardening

img
img

The course explores the various tools and techniques commonly used by Linux system administrators…

File Size: 582.5 MB.

Stone River Elearning – Linux Security and Hardening

Stone River Elearning - Linux Security and Hardening

The Linux Security course explores the various tools and techniques commonly used by Linux system administrators and end users to complete their day-to-day tasks in a Linux environment. It is designed for experienced computer users who have limited previous exposure to Linux, whether they are working in an individual or a corporate environment.

The Linux Security course is an essential course for experienced Linux professionals who are looking to become expert administrators and be able to harden the Linux infrastructure that they have deployed. The course builds on the basic concepts of Linux and covers the more advanced security topics essential to make the systems more secure. The course covers the core security topics of the operating system and focuses on the standardized techniques that can be applied to all of the Linux Operating System’s environments such as Ubuntu, CentOS, Debian, Kali, RedHat and Fedora etc.

The course is designed for experienced candidates. Prior knowledge of the basics of Linux Operating system is required to fully comprehend the contents of this course.

The course is intended for:

  • Candidates looking to learn the Linux Command Line Interface
  • Existing Linux users who want to become power users
  • Candidates working on Linux-based projects
  • Linux support staff
  • Linux system administrators

Course Curriculum

Course Overview and Downloads
  • Course Overview (1:25)
  • Course Downloads
General Security
  • Section Overview – General Security (1:09)
  • Is Linux Secure? (2:26)
  • What Makes Linux Secure? (8:18)
  • Security Guidelines and Principles (7:41)
  • Section Summary – General Security (1:36)
Physical Security
  • Section Overview – Physical Security (0:58)
  • Physical Security Concepts (7:41)
  • Single User Mode Security (6:45)
  • Single User Mode and Blank Passwords (3:13)
  • Securing the Boot Loader (7:01)
  • Disk Encryption (5:34)
  • Encrypting a New Device, Part I (8:38)
  • Encrypting a New Device, Part II (4:17)
  • Encrypting an Existing Device (0:52)
  • Disabling Control Alt Delete (1:44)
  • Section Summary – Physical Security (0:42)
Account Security
  • Section Overview – Account Security (0:45)
  • Intro to PAM (5:13)
  • PAM Configuration Example (4:04)
  • Password Security (7:58)
  • Account Security Demo #1 (UID 0) (3:11)
  • Controlling Account Access (5:06)
  • Security by Account Type (6:01)
  • Account Security Demo #2 (2:44)
  • Account Security Demo #3 (4:43)
Network Security
  • Section Overview – Network Security (0:35)
  • Network Security, Part I (7:54)
  • Network Security, Part II (6:20)
  • Securing SSHD, Part I (7:52)
  • Securing SSHD, Part II (3:15)
  • Linux Firewall Fundamentals (7:36)
  • Configuring the Firewall from the Command Line (4:03)
  • Firewall Rule Specifications (4:43)
  • Example Firewall Rules (3:59)
  • Linux Firewall Demonstration (9:47)
  • TCP Wrappers, Part I (7:02)
  • TCP Wrappers, Part I| (4:02)
File System Security
  • Section Overview – File System Security (1:02)
  • File and Directory Permissions (0:32)
  • File and Directory Permissions, Part I (11:14)
  • File and Directory Permissions, Part II (9:28)
  • Special Modes, Part I (7:56)
  • Special Modes, Part II (3:04)
  • File Attributes (6:05)
  • File Attributes Demo (2:48)
  • ACLs (9:25)
  • ACLs Demo (6:13)
  • Rootkits (8:33)
  • Rootkit Hunter Demonstration (7:12)
Additional Security Resources
  • Additional Security Resources (4:52)

There are no reviews yet.

Add a Review
Original price was: $99.00.Current price is: $22.00.

The course explores the various tools and techniques commonly used by Linux system administrators... File Size: 582.5 MB.

Purchase this product now and earn 22 Points!
10 Points = $1