Tags
Language
Tags
October 2025
Su Mo Tu We Th Fr Sa
28 29 30 1 2 3 4
5 6 7 8 9 10 11
12 13 14 15 16 17 18
19 20 21 22 23 24 25
26 27 28 29 30 31 1
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Linux Security Techniques 2023

    Posted By: ELK1nG
    Linux Security Techniques 2023

    Linux Security Techniques
    Published 9/2023
    MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
    Language: English | Size: 9.66 GB | Duration: 10h 46m

    Security features for modern Linux distributions

    What you'll learn

    Identify security incidents, track system activities, and ensure compliance with security policies

    Maintain the integrity and confidentiality of your Linux systems and ensures compliance with security policies and regulations.

    Develop and enforce data security policies tailored to your organization's specific needs and regulatory requirements.

    Learn to configuring SELinux, verify status of SELinux, modify status temporarily, view SELinux

    Learn all about TCP Wrappers, enable TCP Wrappers for a service, allowing access to more than one service at a time, option fields, generating log messages, SPA

    Get the skills and knowledge to effectively assess and improve the security of computer systems, networks, and applications

    Requirements

    Proficiency in Linux command-line operations.

    Basic understanding of Linux system administration.

    Description

    The Linux Security Techniques series introduces the viewers to the various security features found in modern Linux distributions. Topics covered include data encryption, auditing access, SELinux and firewall configuration among others. The series also lightly covers penetration testing to ensure that each security technique is implemented properly.Linux Security Techniques is an advanced-level course designed to equip students with the knowledge and skills necessary to secure Linux-based systems effectively. In today's digital landscape, securing Linux servers and workstations is of utmost importance, as these systems power a wide range of critical infrastructure and applications. This course delves deep into various security aspects of Linux, providing students with practical insights and hands-on experience in safeguarding their systems against a wide range of threats.This Linux Security Techniques course will empower students with the knowledge and skills needed to mitigate security risks, protect critical assets, and maintain the integrity of Linux-based systems in a constantly evolving cybersecurity landscape.· Identify security incidents, track system activities, and ensure compliance with security policies· Maintain the integrity and confidentiality of your Linux systems and ensures compliance with security policies and regulations.· Develop and enforce data security policies tailored to your organization's specific needs and regulatory requirements.· Learn to configuring SELinux, verify status of SELinux, modify status temporarily, view SELinux· Learn all about TCP Wrappers, enable TCP Wrappers for a service, allowing access to more than one service at a time, option fields, generating log messages, SPAWN, EXPANSIONS, TWIST, configuring rules, and restricting access to SSH.· Get the skills and knowledge to effectively assess and improve the security of computer systems, networks, and applications

    Overview

    Section 1: Monitoring and Auditing Security

    Lecture 1 Overview

    Lecture 2 Managing Logs with syslog

    Lecture 3 Managing Logs with journald

    Lecture 4 Auditing User Passwords

    Lecture 5 Auditing User Passwords Part 2

    Lecture 6 Auditing the Filesystem

    Lecture 7 Auditing SUID and SGID

    Lecture 8 Auditing Logins with fail2ban

    Section 2: Data Security

    Lecture 9 LUKS Disk Encryption

    Lecture 10 Data Encryption with GPG

    Lecture 11 MD5 and SHA Checksums

    Lecture 12 Data Encryption with SSH

    Section 3: Securing Services

    Lecture 13 Securing Services with SELinux

    Lecture 14 Securing Services with SELinux Part 2

    Lecture 15 Chroot Jails

    Lecture 16 LXC Containers

    Section 4: Securing Networks

    Lecture 17 TCP Wrappers

    Lecture 18 Network Security with iptables

    Lecture 19 Network Security with firewalld

    Section 5: Security Testing

    Lecture 20 Verifying Firewall Configurations

    Lecture 21 Verifying Network Data Encryption

    Lecture 22 Verifying Network Data Encryption Part 2

    Linux system administrators,DevOps engineers,Security professionals,IT professionals responsible for Linux-based systems