Tags
Language
Tags
May 2025
Su Mo Tu We Th Fr Sa
27 28 29 30 1 2 3
4 5 6 7 8 9 10
11 12 13 14 15 16 17
18 19 20 21 22 23 24
25 26 27 28 29 30 31
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Complete Linux Security & Hardening With Practical Examples

    Posted By: ELK1nG
    Complete Linux Security & Hardening With Practical Examples

    Complete Linux Security & Hardening With Practical Examples
    Last updated 11/2021
    MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
    Language: English | Size: 3.73 GB | Duration: 16h 18m

    The Best Linux Security Course that prepare you to protects your Systems from attacks by hackers. Helps in RHCSA & RHCE

    What you'll learn
    By the end of this course you will be able to apply most of the security measures in your Linux environment
    You will be able to pass the Redhat Certified Engineer exam (EX300)
    You will reduce the risk of your Linux system being hacked or attacked
    You will have expert knowledge of Linux account and system securities
    Requirements
    Basic understanding of Linux. My suggestion is to take my "Complete Linux Training Course to Get Your Dream IT Job"
    You will need a Linux machine but if you have a Windows computer then you can install VirtualBox and install Linux (The instruction are covered in this course)
    Description
    If you have basic understanding of Linux and want to enhance your skill in Linux security and system hardening then this course is perfect fit for you.  Many security policies and standards require system administrators to address specific user authentication concerns, application of updates, system auditing and logging, file system integrity, and more. This course provides strategies for addressing specific policy and configuration concerns.This course is intended to develop the skills needed to ensure data integrity on computer systems for organizations with high security standards.  I have 35,000+ students on Udemy platform and many of them are able to secure their dream job in IT field just by taking my courses.  I always start with basic and then dive into advance levelThis course is best for someone who:wants to learn almost everything about Linux securitywants to step-up in his/her careeris looking for a job in Linuxneeds technical guidance on how to enhance the security of Linux systemsis responsible for implementing security policy requirements on Linux systems consistently and in a reproducible waymust be able to demonstrate that Linux systems meet security policy requirementsmaintains continued adherence to security requirements, including management of security-critical operating system/software updates===================================================================================Overview of the course:There are total of 10 sections in this courseSection 1 – Introduction and Course OverviewCourse OverviewDownload SyllabusSection 2 – Security ConceptsWhat is Security and OS Hardening?Comparing House Security with Computer SecuritySecuring All Operating SystemsImportance of Linux SecuritySecurity Implementation ToolsType of Security BreachQuiz, Handouts and HomeworkSection 3 - Lab Setup (optional)What is VirtualBox?Installing Oracle VirtualBoxCreating First Virtual MachineLinux InstallationSection 4 - Securing User EnvironmentUnderstanding /etc/passwd, /etc/group and /etc/shadowThe /etc/login.def FileCreate User Account and Change PasswordChange Password ParametersSet Password PolicyLock or Disable User Accounts AutomaticallyLock or Disable User Accounts ManuallyLock User Account After 3 Failed AttemptsRestrict root LoginDisable SSH Access for a Specific UserImplement UID/GID PolicyCentralized Authentication Servicesudo AccessMonitor User ActivitySection 5 - PAM (Pluggable Authentication Module)What is PAM?The Importance of PAMThe PAM Configuration Files FormatPAM Config File – Module InterfacesAccount Access Through PAMPAM Config File – Control FlagsPAM Config File – Modules (SO)PAM Aware Services and StacksSection 6 - Securing Linux FilesystemLinux File TypesLinux File AttributesLinux File Ownership and PermissionsChanging File PermissionChanging File OwnershipAccess Control List (ACL)Section 7 - Securing Linux SystemMessage of the Day and customizing message of the dayPhysical Server SecurityRemove Unnecessary or Orphan PackagesKeep Kernel and System Up to DateStop and Disable Unwanted ServicesSeparate Disk PartitionsDisable Ctrl+Alt+DeleteRunning One Service per SystemChange Default Console PasswordsDisable USB Stick DetectionEnable Network Time Protocol (NTP or Chronyd)Lockdown CronjobsChange SSH PortsSELinux (longest lecture and lab)BackupsSection 8 - Securing Linux System NetworkIntroduction to Firewalliptables (tables, chains and targets)iptables (practical examples)Firewall (firewalld)firewalld (Practical Examples)firewalld (GUI)Encrypt Incoming and Outgoing TrafficSSH vs. TelnetTurn Off IPV6 (If not in use)Section 9 - Securing Environment Around LinuxHardware/Network FirewallNetwork Address Translation (NAT)VPN TunnelApplication and Database EncryptionSection 10 - Additional ResourcesMany more lectures on Linux…===================================================================================Here is the testimonial from my students:To all of you that are looking for a REALLY GOOD LINUX course, THIS IS IT, SERIOUSLY I promise you won't find a course on LINUX here that is THIS GOOD. – T.J. Marstiller (Udemy Student)Imran is a very knowledgeable and engaging instructor. As others have said, you can tell that he is not just trying to sell a course, but that he is invested in giving his students a strong career foundation with a positive and approachable attitude. He is also entertaining with his use of pop culture and practical work examples. It really feels like you're in a classroom with him. I'm taking this course mainly as a hobbyist, but got a lot from it already. The homework assignments, quizzes, and handouts help reinforce the material.   – Raymond B.  (Udemy Student)Main thing about course is its simplicity and the hierarchy. Design is very good and easy which helps to understand things better.  – Akash Garg (Udemy Student)I just love the teaching ad the learning experience I am getting  – Jacob Samba (Udemy Student)Imran Afzal might be my favorite teacher I've EVER had. He is funny, and engaging. The course was easy to follow, and with no experience starting I am now extremely comfortable with Linux, and actually really like it. He does make you do your googles, but this is not a bad thing especially considering the nature of IT and documentation to solve your own problems. I highly recommend.  – Vanessa Diaz-Goumond (Udemy Student)The course is run very well and I really like the handouts and the homework that is assigned. The homework helps me learn and continue with the learning process even when adult life is still progressing forward.  – Thomas Rogers (Udemy Student)Such an amazing instructor. Imran must have put in a lot of effort in structuring the course and taking the student step by step, he takes his time in explaining everything, from what Linux is, how to down load it, coding, etc. I have taken other courses from Imran. I am a student for life. Keep it up and please keep preparing more courses for please like us who can benefit from your way of teaching, knowledge and experience. Thank you.  – Ali Shiekh (Udemy Student)In the first place I say a big thank you to the instructor for making such a great course. I was afraid to learn Linux. I now feel very comfortable with Linux. I have understood both the concept behind and the practical as well. I would recommend every one who is NEW to Linux and wants to grab it once and for all without wasting time to go ahead and ENROLL. You will not regret it. I would like the instructor to do same for WINDOWS SERVER ADMIN., I don't seem to find any better and beginner oriented course out there that could be matched with this course. To me, it is the BEST Linux Course on Online. I just started some real world projects with Linux after this great course, I was new to Linux and in just a month I am on the command line always playing.  – Opoku Bright (Udemy Student)I genuinely look forward to additional courses in the future. This has been so informative. You hear the name oracle all the time, but this was well put in layman’s terms  – Atoofa Hasan (Classroom Student)Imran Afzal eats, breathes and sleeps Linux! He really knows his stuff. I feel like he has brought me from a novice level education to masters level in a short time period. Anyone who is looking to get a job in Linux should definitely take this course.  – TJ Walker (Udemy Student)

    Overview

    Section 1: Introduction and Course Overview

    Lecture 1 Introduction

    Lecture 2 Syllabus Overiew

    Lecture 3 Download Syllabus

    Lecture 4 Thank You

    Section 2: Security Concepts

    Lecture 5 Welcome to Security Concepts

    Lecture 6 What is Security and OS Hardening?

    Lecture 7 Comparing House Security with Computer Security

    Lecture 8 Securing All Operating Systems

    Lecture 9 Importance of Linux Security

    Lecture 10 Security Implementation Tools

    Lecture 11 Type of Security Breach

    Lecture 12 Handouts

    Lecture 13 Homework

    Section 3: Lab Setup

    Lecture 14 Welcome to Lab Setup

    Lecture 15 What is Oracle VirtualBox?

    Lecture 16 Downloading and Installing Oracle VirtualBox

    Lecture 17 Creating First Virtual Machine

    Lecture 18 Linux CentOS7 Installation (Recommended)

    Lecture 19 Linux CentOS8 Installation (Optional)

    Lecture 20 Handouts

    Lecture 21 Homework

    Section 4: Securing User Environment

    Lecture 22 Welcome to Securing User Environment

    Lecture 23 Understanding /etc/passwd

    Lecture 24 Understanding /etc/group

    Lecture 25 Understanding /etc/shadow

    Lecture 26 The /etc/login.defs File

    Lecture 27 Create User Account and Change Password

    Lecture 28 Change Password Parameters

    Lecture 29 Set Password Policy

    Lecture 30 Lock or Disable User Accounts

    Lecture 31 Lock or Disable User Accounts Manually

    Lecture 32 Lock User Account After 3 Failed Attempts

    Lecture 33 Restrict root Login

    Lecture 34 Disable SSH Access for a Specific User

    Lecture 35 Limiting User Account Resources (ulimit)

    Lecture 36 Implement UID/GID Policy

    Lecture 37 Centralized Authentication Service

    Lecture 38 sudo Access

    Lecture 39 Monitor User Activity

    Lecture 40 Homework

    Lecture 41 Handouts

    Section 5: PAM (Pluggable Authentication Module)

    Lecture 42 Welcome to PAM

    Lecture 43 What is PAM?

    Lecture 44 The Importance of PAM

    Lecture 45 The PAM Configuration Files Format

    Lecture 46 PAM Config File – Module Interfaces

    Lecture 47 Account Access Through PAM

    Lecture 48 PAM Config File – Control Flags

    Lecture 49 PAM Config File – Modules (SO)

    Lecture 50 PAM Aware Services and Stacks

    Lecture 51 Handouts

    Lecture 52 Homework

    Section 6: Securing Linux Filesystem

    Lecture 53 Welcome to Securing Linux Filesystem

    Lecture 54 Linux File Types

    Lecture 55 Linux File Attributes

    Lecture 56 Linux File Ownership and Permissions

    Lecture 57 Changing File Permission - LAB

    Lecture 58 Changing FIle Ownership - LAB

    Lecture 59 Access Control List (ACL)

    Lecture 60 Handouts

    Lecture 61 Homework

    Section 7: Securing Linux System

    Lecture 62 Welcome to Securing Linux System

    Lecture 63 Message of the Day

    Lecture 64 Customize Message of the Day

    Lecture 65 Physical Server Security

    Lecture 66 Remove Un-necessary or Orphan Packages

    Lecture 67 Keep Kernel and System Up to Date

    Lecture 68 Stop and Disable Unwanted Services

    Lecture 69 Separate Disk Partitions

    Lecture 70 Disable Ctrl+Alt+Delete

    Lecture 71 Running One Service per System

    Lecture 72 Change Default Console Passwords (Only Physical)

    Lecture 73 Disable USB Stick Detection

    Lecture 74 Enable an Network Time Protocol (NTP or Chronyd)

    Lecture 75 Lockdown Cronjobs

    Lecture 76 Change SSH Port

    Lecture 77 SELinux

    Lecture 78 Backups

    Lecture 79 Handouts

    Lecture 80 Homework

    Section 8: Securing Linux System Network

    Lecture 81 Welcome to Securing Linux Network

    Lecture 82 Introduction to Firewall

    Lecture 83 Firewall (iptables – tables, chains and targets)

    Lecture 84 Firewall (iptables – practical examples)

    Lecture 85 Firewall (firewalld)

    Lecture 86 Firewall (firewalld – Practical Examples)

    Lecture 87 Firewall (firewalld GUI)

    Lecture 88 Encrypt Incoming and Outgoing Traffic

    Lecture 89 SSH vs. Telnet

    Lecture 90 Turn Off IPV6 (If not in use)

    Lecture 91 Handouts

    Lecture 92 Homework

    Section 9: Securing Environment Around Linux

    Lecture 93 Welcome to Securing Environment Around Linux

    Lecture 94 Hardware/Network Firewall

    Lecture 95 Network Address Translation (NAT)

    Lecture 96 VPN Tunnel

    Lecture 97 Application and Database Encryption

    Lecture 98 Types of Security Threats

    Lecture 99 Handouts

    Lecture 100 Homework

    Lecture 101 Congratulations

    Section 10: Additional Resources

    Lecture 102 Welcome to Additional Resources

    Lecture 103 Getting Linux Commands Help

    Lecture 104 Compress and Uncompress Files

    Lecture 105 Absolute and Relative Path

    Lecture 106 Changing Password

    Lecture 107 sed Command Examples

    Lecture 108 Talking to Users

    Lecture 109 Wildcards

    Lecture 110 Hard and Soft Link

    Lecture 111 User Directory Authentication

    Lecture 112 Difference AD, openLDAP, WinBind etc.

    Lecture 113 Open LDAP

    Lecture 114 System Log Monitor

    Lecture 115 Recover Root Password

    Lecture 116 File Transfer Commands

    Lecture 117 NIC Bonding

    Lecture 118 Advance Package Management

    Lecture 119 File System Check

    Lecture 120 Compress and uncompress

    Lecture 121 File Maintenace Commands

    Lecture 122 File Ownership Commands

    Lecture 123 Environment Variable

    Lecture 124 Linux File Editor - vi

    Lecture 125 Process Management

    Lecture 126 User Account Management

    Lecture 127 Create Local Yum Repo

    Lecture 128 Securing Linux Machine - Quick Recap

    Section 11: Bonus Section

    Lecture 129 Welcome to Bonus Section

    Lecture 130 Bonus Lecture

    Anyone who wants to have complete understanding Linux security and OS hardening,Anyone who wants to advance his/her career,Anyone who wants to pass the RHCE EX300 exam