Tags
Language
Tags
December 2024
Su Mo Tu We Th Fr Sa
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 31 1 2 3 4

Complete Linux Security & Hardening With Practical Examples

Posted By: ELK1nG
Complete Linux Security & Hardening With Practical Examples

Complete Linux Security & Hardening With Practical Examples
Last updated 11/2021
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 3.73 GB | Duration: 16h 18m

The Best Linux Security Course that prepare you to protects your Systems from attacks by hackers. Helps in RHCSA & RHCE

What you'll learn
By the end of this course you will be able to apply most of the security measures in your Linux environment
You will be able to pass the Redhat Certified Engineer exam (EX300)
You will reduce the risk of your Linux system being hacked or attacked
You will have expert knowledge of Linux account and system securities
Requirements
Basic understanding of Linux. My suggestion is to take my "Complete Linux Training Course to Get Your Dream IT Job"
You will need a Linux machine but if you have a Windows computer then you can install VirtualBox and install Linux (The instruction are covered in this course)
Description
If you have basic understanding of Linux and want to enhance your skill in Linux security and system hardening then this course is perfect fit for you.  Many security policies and standards require system administrators to address specific user authentication concerns, application of updates, system auditing and logging, file system integrity, and more. This course provides strategies for addressing specific policy and configuration concerns.This course is intended to develop the skills needed to ensure data integrity on computer systems for organizations with high security standards.  I have 35,000+ students on Udemy platform and many of them are able to secure their dream job in IT field just by taking my courses.  I always start with basic and then dive into advance levelThis course is best for someone who:wants to learn almost everything about Linux securitywants to step-up in his/her careeris looking for a job in Linuxneeds technical guidance on how to enhance the security of Linux systemsis responsible for implementing security policy requirements on Linux systems consistently and in a reproducible waymust be able to demonstrate that Linux systems meet security policy requirementsmaintains continued adherence to security requirements, including management of security-critical operating system/software updates===================================================================================Overview of the course:There are total of 10 sections in this courseSection 1 – Introduction and Course OverviewCourse OverviewDownload SyllabusSection 2 – Security ConceptsWhat is Security and OS Hardening?Comparing House Security with Computer SecuritySecuring All Operating SystemsImportance of Linux SecuritySecurity Implementation ToolsType of Security BreachQuiz, Handouts and HomeworkSection 3 - Lab Setup (optional)What is VirtualBox?Installing Oracle VirtualBoxCreating First Virtual MachineLinux InstallationSection 4 - Securing User EnvironmentUnderstanding /etc/passwd, /etc/group and /etc/shadowThe /etc/login.def FileCreate User Account and Change PasswordChange Password ParametersSet Password PolicyLock or Disable User Accounts AutomaticallyLock or Disable User Accounts ManuallyLock User Account After 3 Failed AttemptsRestrict root LoginDisable SSH Access for a Specific UserImplement UID/GID PolicyCentralized Authentication Servicesudo AccessMonitor User ActivitySection 5 - PAM (Pluggable Authentication Module)What is PAM?The Importance of PAMThe PAM Configuration Files FormatPAM Config File – Module InterfacesAccount Access Through PAMPAM Config File – Control FlagsPAM Config File – Modules (SO)PAM Aware Services and StacksSection 6 - Securing Linux FilesystemLinux File TypesLinux File AttributesLinux File Ownership and PermissionsChanging File PermissionChanging File OwnershipAccess Control List (ACL)Section 7 - Securing Linux SystemMessage of the Day and customizing message of the dayPhysical Server SecurityRemove Unnecessary or Orphan PackagesKeep Kernel and System Up to DateStop and Disable Unwanted ServicesSeparate Disk PartitionsDisable Ctrl+Alt+DeleteRunning One Service per SystemChange Default Console PasswordsDisable USB Stick DetectionEnable Network Time Protocol (NTP or Chronyd)Lockdown CronjobsChange SSH PortsSELinux (longest lecture and lab)BackupsSection 8 - Securing Linux System NetworkIntroduction to Firewalliptables (tables, chains and targets)iptables (practical examples)Firewall (firewalld)firewalld (Practical Examples)firewalld (GUI)Encrypt Incoming and Outgoing TrafficSSH vs. TelnetTurn Off IPV6 (If not in use)Section 9 - Securing Environment Around LinuxHardware/Network FirewallNetwork Address Translation (NAT)VPN TunnelApplication and Database EncryptionSection 10 - Additional ResourcesMany more lectures on Linux…===================================================================================Here is the testimonial from my students:To all of you that are looking for a REALLY GOOD LINUX course, THIS IS IT, SERIOUSLY I promise you won't find a course on LINUX here that is THIS GOOD. – T.J. Marstiller (Udemy Student)Imran is a very knowledgeable and engaging instructor. As others have said, you can tell that he is not just trying to sell a course, but that he is invested in giving his students a strong career foundation with a positive and approachable attitude. He is also entertaining with his use of pop culture and practical work examples. It really feels like you're in a classroom with him. I'm taking this course mainly as a hobbyist, but got a lot from it already. The homework assignments, quizzes, and handouts help reinforce the material.   – Raymond B.  (Udemy Student)Main thing about course is its simplicity and the hierarchy. Design is very good and easy which helps to understand things better.  – Akash Garg (Udemy Student)I just love the teaching ad the learning experience I am getting  – Jacob Samba (Udemy Student)Imran Afzal might be my favorite teacher I've EVER had. He is funny, and engaging. The course was easy to follow, and with no experience starting I am now extremely comfortable with Linux, and actually really like it. He does make you do your googles, but this is not a bad thing especially considering the nature of IT and documentation to solve your own problems. I highly recommend.  – Vanessa Diaz-Goumond (Udemy Student)The course is run very well and I really like the handouts and the homework that is assigned. The homework helps me learn and continue with the learning process even when adult life is still progressing forward.  – Thomas Rogers (Udemy Student)Such an amazing instructor. Imran must have put in a lot of effort in structuring the course and taking the student step by step, he takes his time in explaining everything, from what Linux is, how to down load it, coding, etc. I have taken other courses from Imran. I am a student for life. Keep it up and please keep preparing more courses for please like us who can benefit from your way of teaching, knowledge and experience. Thank you.  – Ali Shiekh (Udemy Student)In the first place I say a big thank you to the instructor for making such a great course. I was afraid to learn Linux. I now feel very comfortable with Linux. I have understood both the concept behind and the practical as well. I would recommend every one who is NEW to Linux and wants to grab it once and for all without wasting time to go ahead and ENROLL. You will not regret it. I would like the instructor to do same for WINDOWS SERVER ADMIN., I don't seem to find any better and beginner oriented course out there that could be matched with this course. To me, it is the BEST Linux Course on Online. I just started some real world projects with Linux after this great course, I was new to Linux and in just a month I am on the command line always playing.  – Opoku Bright (Udemy Student)I genuinely look forward to additional courses in the future. This has been so informative. You hear the name oracle all the time, but this was well put in layman’s terms  – Atoofa Hasan (Classroom Student)Imran Afzal eats, breathes and sleeps Linux! He really knows his stuff. I feel like he has brought me from a novice level education to masters level in a short time period. Anyone who is looking to get a job in Linux should definitely take this course.  – TJ Walker (Udemy Student)

Overview

Section 1: Introduction and Course Overview

Lecture 1 Introduction

Lecture 2 Syllabus Overiew

Lecture 3 Download Syllabus

Lecture 4 Thank You

Section 2: Security Concepts

Lecture 5 Welcome to Security Concepts

Lecture 6 What is Security and OS Hardening?

Lecture 7 Comparing House Security with Computer Security

Lecture 8 Securing All Operating Systems

Lecture 9 Importance of Linux Security

Lecture 10 Security Implementation Tools

Lecture 11 Type of Security Breach

Lecture 12 Handouts

Lecture 13 Homework

Section 3: Lab Setup

Lecture 14 Welcome to Lab Setup

Lecture 15 What is Oracle VirtualBox?

Lecture 16 Downloading and Installing Oracle VirtualBox

Lecture 17 Creating First Virtual Machine

Lecture 18 Linux CentOS7 Installation (Recommended)

Lecture 19 Linux CentOS8 Installation (Optional)

Lecture 20 Handouts

Lecture 21 Homework

Section 4: Securing User Environment

Lecture 22 Welcome to Securing User Environment

Lecture 23 Understanding /etc/passwd

Lecture 24 Understanding /etc/group

Lecture 25 Understanding /etc/shadow

Lecture 26 The /etc/login.defs File

Lecture 27 Create User Account and Change Password

Lecture 28 Change Password Parameters

Lecture 29 Set Password Policy

Lecture 30 Lock or Disable User Accounts

Lecture 31 Lock or Disable User Accounts Manually

Lecture 32 Lock User Account After 3 Failed Attempts

Lecture 33 Restrict root Login

Lecture 34 Disable SSH Access for a Specific User

Lecture 35 Limiting User Account Resources (ulimit)

Lecture 36 Implement UID/GID Policy

Lecture 37 Centralized Authentication Service

Lecture 38 sudo Access

Lecture 39 Monitor User Activity

Lecture 40 Homework

Lecture 41 Handouts

Section 5: PAM (Pluggable Authentication Module)

Lecture 42 Welcome to PAM

Lecture 43 What is PAM?

Lecture 44 The Importance of PAM

Lecture 45 The PAM Configuration Files Format

Lecture 46 PAM Config File – Module Interfaces

Lecture 47 Account Access Through PAM

Lecture 48 PAM Config File – Control Flags

Lecture 49 PAM Config File – Modules (SO)

Lecture 50 PAM Aware Services and Stacks

Lecture 51 Handouts

Lecture 52 Homework

Section 6: Securing Linux Filesystem

Lecture 53 Welcome to Securing Linux Filesystem

Lecture 54 Linux File Types

Lecture 55 Linux File Attributes

Lecture 56 Linux File Ownership and Permissions

Lecture 57 Changing File Permission - LAB

Lecture 58 Changing FIle Ownership - LAB

Lecture 59 Access Control List (ACL)

Lecture 60 Handouts

Lecture 61 Homework

Section 7: Securing Linux System

Lecture 62 Welcome to Securing Linux System

Lecture 63 Message of the Day

Lecture 64 Customize Message of the Day

Lecture 65 Physical Server Security

Lecture 66 Remove Un-necessary or Orphan Packages

Lecture 67 Keep Kernel and System Up to Date

Lecture 68 Stop and Disable Unwanted Services

Lecture 69 Separate Disk Partitions

Lecture 70 Disable Ctrl+Alt+Delete

Lecture 71 Running One Service per System

Lecture 72 Change Default Console Passwords (Only Physical)

Lecture 73 Disable USB Stick Detection

Lecture 74 Enable an Network Time Protocol (NTP or Chronyd)

Lecture 75 Lockdown Cronjobs

Lecture 76 Change SSH Port

Lecture 77 SELinux

Lecture 78 Backups

Lecture 79 Handouts

Lecture 80 Homework

Section 8: Securing Linux System Network

Lecture 81 Welcome to Securing Linux Network

Lecture 82 Introduction to Firewall

Lecture 83 Firewall (iptables – tables, chains and targets)

Lecture 84 Firewall (iptables – practical examples)

Lecture 85 Firewall (firewalld)

Lecture 86 Firewall (firewalld – Practical Examples)

Lecture 87 Firewall (firewalld GUI)

Lecture 88 Encrypt Incoming and Outgoing Traffic

Lecture 89 SSH vs. Telnet

Lecture 90 Turn Off IPV6 (If not in use)

Lecture 91 Handouts

Lecture 92 Homework

Section 9: Securing Environment Around Linux

Lecture 93 Welcome to Securing Environment Around Linux

Lecture 94 Hardware/Network Firewall

Lecture 95 Network Address Translation (NAT)

Lecture 96 VPN Tunnel

Lecture 97 Application and Database Encryption

Lecture 98 Types of Security Threats

Lecture 99 Handouts

Lecture 100 Homework

Lecture 101 Congratulations

Section 10: Additional Resources

Lecture 102 Welcome to Additional Resources

Lecture 103 Getting Linux Commands Help

Lecture 104 Compress and Uncompress Files

Lecture 105 Absolute and Relative Path

Lecture 106 Changing Password

Lecture 107 sed Command Examples

Lecture 108 Talking to Users

Lecture 109 Wildcards

Lecture 110 Hard and Soft Link

Lecture 111 User Directory Authentication

Lecture 112 Difference AD, openLDAP, WinBind etc.

Lecture 113 Open LDAP

Lecture 114 System Log Monitor

Lecture 115 Recover Root Password

Lecture 116 File Transfer Commands

Lecture 117 NIC Bonding

Lecture 118 Advance Package Management

Lecture 119 File System Check

Lecture 120 Compress and uncompress

Lecture 121 File Maintenace Commands

Lecture 122 File Ownership Commands

Lecture 123 Environment Variable

Lecture 124 Linux File Editor - vi

Lecture 125 Process Management

Lecture 126 User Account Management

Lecture 127 Create Local Yum Repo

Lecture 128 Securing Linux Machine - Quick Recap

Section 11: Bonus Section

Lecture 129 Welcome to Bonus Section

Lecture 130 Bonus Lecture

Anyone who wants to have complete understanding Linux security and OS hardening,Anyone who wants to advance his/her career,Anyone who wants to pass the RHCE EX300 exam