Tags
Language
Tags
December 2024
Su Mo Tu We Th Fr Sa
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 31 1 2 3 4

Linux Security Techniques 2023

Posted By: ELK1nG
Linux Security Techniques 2023

Linux Security Techniques
Published 9/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 9.66 GB | Duration: 10h 46m

Security features for modern Linux distributions

What you'll learn

Identify security incidents, track system activities, and ensure compliance with security policies

Maintain the integrity and confidentiality of your Linux systems and ensures compliance with security policies and regulations.

Develop and enforce data security policies tailored to your organization's specific needs and regulatory requirements.

Learn to configuring SELinux, verify status of SELinux, modify status temporarily, view SELinux

Learn all about TCP Wrappers, enable TCP Wrappers for a service, allowing access to more than one service at a time, option fields, generating log messages, SPA

Get the skills and knowledge to effectively assess and improve the security of computer systems, networks, and applications

Requirements

Proficiency in Linux command-line operations.

Basic understanding of Linux system administration.

Description

The Linux Security Techniques series introduces the viewers to the various security features found in modern Linux distributions. Topics covered include data encryption, auditing access, SELinux and firewall configuration among others. The series also lightly covers penetration testing to ensure that each security technique is implemented properly.Linux Security Techniques is an advanced-level course designed to equip students with the knowledge and skills necessary to secure Linux-based systems effectively. In today's digital landscape, securing Linux servers and workstations is of utmost importance, as these systems power a wide range of critical infrastructure and applications. This course delves deep into various security aspects of Linux, providing students with practical insights and hands-on experience in safeguarding their systems against a wide range of threats.This Linux Security Techniques course will empower students with the knowledge and skills needed to mitigate security risks, protect critical assets, and maintain the integrity of Linux-based systems in a constantly evolving cybersecurity landscape.· Identify security incidents, track system activities, and ensure compliance with security policies· Maintain the integrity and confidentiality of your Linux systems and ensures compliance with security policies and regulations.· Develop and enforce data security policies tailored to your organization's specific needs and regulatory requirements.· Learn to configuring SELinux, verify status of SELinux, modify status temporarily, view SELinux· Learn all about TCP Wrappers, enable TCP Wrappers for a service, allowing access to more than one service at a time, option fields, generating log messages, SPAWN, EXPANSIONS, TWIST, configuring rules, and restricting access to SSH.· Get the skills and knowledge to effectively assess and improve the security of computer systems, networks, and applications

Overview

Section 1: Monitoring and Auditing Security

Lecture 1 Overview

Lecture 2 Managing Logs with syslog

Lecture 3 Managing Logs with journald

Lecture 4 Auditing User Passwords

Lecture 5 Auditing User Passwords Part 2

Lecture 6 Auditing the Filesystem

Lecture 7 Auditing SUID and SGID

Lecture 8 Auditing Logins with fail2ban

Section 2: Data Security

Lecture 9 LUKS Disk Encryption

Lecture 10 Data Encryption with GPG

Lecture 11 MD5 and SHA Checksums

Lecture 12 Data Encryption with SSH

Section 3: Securing Services

Lecture 13 Securing Services with SELinux

Lecture 14 Securing Services with SELinux Part 2

Lecture 15 Chroot Jails

Lecture 16 LXC Containers

Section 4: Securing Networks

Lecture 17 TCP Wrappers

Lecture 18 Network Security with iptables

Lecture 19 Network Security with firewalld

Section 5: Security Testing

Lecture 20 Verifying Firewall Configurations

Lecture 21 Verifying Network Data Encryption

Lecture 22 Verifying Network Data Encryption Part 2

Linux system administrators,DevOps engineers,Security professionals,IT professionals responsible for Linux-based systems