Tags
Language
Tags
June 2025
Su Mo Tu We Th Fr Sa
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 1 2 3 4 5
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Linux: Linux Security Masterclass: 3-In-1

    Posted By: ELK1nG
    Linux: Linux Security Masterclass: 3-In-1

    Linux: Linux Security Masterclass: 3-In-1
    Last updated 7/2018
    MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
    Language: English | Size: 3.61 GB | Duration: 11h 20m

    One-stop solution to all your Linux security problems!

    What you'll learn

    Work with the command-line efficiently, learn how to navigate the Linux filesystem, and work with files.

    Protect your Linux Server by securing memory, using security banners, and P.W. management

    Securing your Linux Server with firewalls and SSL encryptions

    Discourage hackers by setting up services such as IP Spoofing Prevention, SSL Security, and more

    Enhance user logins with SSH Keys

    Harden your Linux Server with DDoS Protection, Public Keys, and more

    Prevent intruders from planting malware, and detect whether malware has been planted

    Prevent insiders from accessing data that they aren’t authorized to access

    Do quick checks to see whether a computer is running network services that it doesn’t need to run

    Learn security techniques that are common to all Linux distros, and some that are distro-specific

    Requirements

    Prior knowledge of Linux is mandatory.

    Description

    Linux is the first choice for any attacker now and more administrators have started moving to the system to create networks or servers for any task. This course will help you create a more secure Linux system.This comprehensive 3-in-1 course is a step by step guide that will help you to take control of your Linux servers and teach you hands-on techniques which will protect your server from internet attacks—from techniques that hackers use today in order to exploit your server, to hardening your server with some of the most advanced protocols out there. Prevent server exploits such as DDoS Protection, hardening login security protocols, and more! Perform a number of advanced Linux security techniques such as network service detection, user authentication, controlling special permissions, encrypting file systems, and much more!Contents and Overview This training program includes 3 complete courses, carefully chosen to give you the most comprehensive training possible. The first course, Fundamentals of Linux, covers fundamentals of Linux in a step by step manner. This course explains and teaches all the important command-line tools and utilities, using very easy to understand, real-world examples to follow along with—in short, you'll learn everything you really need to know about Linux when starting out from scratch as a new system administrator or for any other reason. The second course, Linux Server Security, covers securing your Linux server with the help of efficient tools and techniques. You will start by discovering techniques that professional hackers use in order to scan a website and a server, in order to carry out their intrusion attacks. Create secure accounts where we'll look into deleting and creating user accounts password and monitoring servers. Maintain your Linux Server in order to get optimized performance and stability. Moving ahead, you will focus on tools that can be used to enhance server security, understand the art of hardening passwords, and fix authentication failures. By the end of the course, you will be confident enough to take control of your Linux servers and use hands-on techniques to protect your server from internet attacks. The third course, Mastering Linux Security and Hardening, covers mastering the art of preventing your Linux system from getting compromised. This course has extensive coverage of techniques that will help prevent attackers from breaching your system, by building a much more secure Linux environment. Learn various security techniques such as SSH hardening, network service detection, and setting up firewalls, encrypting file systems, protecting user accounts, authentication processes, and so on. Moving forward, you will also develop hands-on skills with advanced Linux permissions, access control, special modes, and more. Lastly, this course will also cover best practices and troubleshooting techniques to get your work done efficiently. By the end of this course, you will be confident in delivering a system that will be much harder to compromise. By the end of the course, you’ll secure your Linux server and protect it from intruders, malware attacks, and other external threats with the help of efficient tools and techniques.
    About the AuthorsOliver Pelz has more than 10 years' experience as a software developer and system administrator. He graduated with a diploma degree in bioinformatics and is currently working at the German Cancer Research Center in Heidelberg, where he has authored and co-authored several scientific publications in the field of bioinformatics. He loves coding and riding his mountain bike in the Black Forest of Germany. He develops web applications and biological databases for his department and scientists all over the world and administers a division-wide Linux-based datacenter. A certified website master, avid hacktivist, and active journalist, Aubrey started his programming career on a Commodore Vic-20, on which he built his first Hello World app. He has built several websites, mobile apps, and Windows applications. On his journeys, he has been a Linux system administrator, ethical hacker, website master, mobile developer, application creator, and game developer. Donald A. Tevault—but you can call him Donnie—got involved with Linux way back in 2006, and has been working with it ever since. He holds the Linux Professional Institute Level 3—Security certification, and the GIAC Incident Handler certification. Donnie is a professional Linux trainer, and thanks to the magic of the internet, teaches Linux classes literally the world over from the comfort of his living room.

    Overview

    Section 1: Fundamentals of Linux

    Lecture 1 The Course Overview

    Lecture 2 Introducing Concepts of Virtualization

    Lecture 3 Installing CentOS 7 in Virtualbox

    Lecture 4 How to work with Virtualbox

    Lecture 5 Connect to Your VM Through SSH

    Lecture 6 Working with Commands

    Lecture 7 File Globbing

    Lecture 8 Quoting Commands

    Lecture 9 Getting Help in the Command Line

    Lecture 10 Working in the Shell Efficiently

    Lecture 11 Streams, Redirects, and Pipes

    Lecture 12 Regular Expressions and grep

    Lecture 13 The sed Command

    Lecture 14 The Awk Command

    Lecture 15 Navigating the Linux Filesystem

    Lecture 16 Working with Files

    Lecture 17 How to Work with File Links

    Lecture 18 Searching for Files

    Lecture 19 Working with Users and Groups

    Lecture 20 Working with File Permissions

    Lecture 21 Working and Viewing Text Files in Linux

    Lecture 22 The VIM Text Editor

    Lecture 23 Essential Linux Commands

    Lecture 24 Additional Linux Programs

    Lecture 25 Processes

    Lecture 26 Signals

    Lecture 27 How to Work with Bash Shell Variables

    Lecture 28 Introduction to Bash Shell Scripting

    Lecture 29 Introduction to Bash Shell Scripting 2

    Lecture 30 How to Automate Script Execution

    Lecture 31 Basic Networking Concepts

    Lecture 32 Basic Networking Concepts 2

    Lecture 33 Install New Software and Update the System

    Lecture 34 Introduction to Services

    Lecture 35 Basic System Troubleshooting and Firewalling

    Lecture 36 Introducing ACL

    Lecture 37 Setuid, Setgid, and Sticky Bit

    Section 2: Linux Server Security

    Lecture 38 The Course Overview

    Lecture 39 Network Mapping

    Lecture 40 Nikto

    Lecture 41 Reverse IP

    Lecture 42 Stress Testing

    Lecture 43 Updates

    Lecture 44 Passwords

    Lecture 45 Passwords (Continued)

    Lecture 46 Accounts

    Lecture 47 HTOP

    Lecture 48 Backup

    Lecture 49 Uninstall

    Lecture 50 Update O.S.

    Lecture 51 Hardware

    Lecture 52 Zabbix

    Lecture 53 Cloudflare

    Lecture 54 Let’s Encrypt

    Lecture 55 Fail2ban

    Lecture 56 SSH Keys

    Lecture 57 Listing Edits

    Lecture 58 Password Strength

    Lecture 59 Authentication Fails

    Lecture 60 Removing Passwords

    Lecture 61 Aliases Computers

    Lecture 62 Password Management

    Lecture 63 ClamAV

    Lecture 64 Memory Time

    Lecture 65 Security Banner

    Lecture 66 IP Spoofing

    Section 3: Mastering Linux Security and Hardening

    Lecture 67 The Course Overview

    Lecture 68 The Threat Landscape and Keeping Up with Security News

    Lecture 69 Introduction to VirtualBox and Cygwin

    Lecture 70 Setting Up sudo Privileges for Full Administrative Users

    Lecture 71 Setting Up sudo for Users with Only Certain Delegated Privileges

    Lecture 72 Advanced Tips and Tricks for Using sudo

    Lecture 73 Locking Down Users' Home Directories the Red Hat/CentOS and Debian/Ubuntu Way

    Lecture 74 Enforcing Strong Password Criteria

    Lecture 75 Setting and Enforcing Password and Account Expiration

    Lecture 76 Preventing Brute-Force Password Attacks

    Lecture 77 Locking User Accounts

    Lecture 78 An Overview of iptables

    Lecture 79 Uncomplicated Firewall for Ubuntu Systems

    Lecture 80 firewalld for Red Hat Systems

    Lecture 81 nftables – A More Universal Type of Firewall System

    Lecture 82 GNU Privacy Guard

    Lecture 83 Encrypting Partitions with Linux Unified Key Setup – LUKS

    Lecture 84 Encrypting Directories with eCryptfs

    Lecture 85 Using VeraCrypt for Cross-Platform Sharing of Encrypted Containers

    Lecture 86 Ensuring that SSH Protocol 1 Is Disabled

    Lecture 87 Creating a User’s SSH Key Set

    Lecture 88 Disabling Username/Password Logins

    Lecture 89 Changing Ownership of Files and Directories

    Lecture 90 Setting Permissions Values

    Lecture 91 Using SUID and SGID

    Lecture 92 Protecting Sensitive Files

    Lecture 93 Creating an Access Control List

    Lecture 94 Creating an Inherited Access Control List

    Lecture 95 Removing a Specific Permission

    Lecture 96 Preventing Loss of ACLs

    Lecture 97 Creating a User Group and Adding Members to It

    Lecture 98 Setting the SGID Bit and the Sticky Bit

    Lecture 99 Accessing Files in the Shared Directory

    Lecture 100 How SELinux Can Benefit a Systems Administrator?

    Lecture 101 Setting Security Contexts for Files and Directories

    Lecture 102 Troubleshooting with setroubleshoot

    Lecture 103 Working with SELinux Policies

    Lecture 104 Looking at AppArmor Profiles

    Lecture 105 Working with AppArmor Command-Line Utilities

    Lecture 106 Installing and Updating ClamAV and maldet

    Lecture 107 Scanning with ClamAV and maldet

    Lecture 108 SELinux Considerations

    Lecture 109 Scanning for Rootkits with Rootkit Hunter

    Lecture 110 Controlling the auditd Daemon and Creating Audit Rule

    Lecture 111 Using ausearch and aureport

    Lecture 112 Scanning and Hardening with Lynis

    People without any pre-knowledge in Linux or for the absolute Linux beginner. This course is right for everyone wanting to start a job in enterprise Linux system administration. One of the most fundamental features of this course is the comprehensive information it provides.,Systems administrator or a network engineer interested in making your Linux environment more secure, then this course is for you.,Security consultants wanting to enhance their Linux security skills will also benefit from this course.,People who want to be proficient in Linux server security handling, and those who have Linux experience but would like to protect servers from vulnerabilities and attacks and stop them being compromised.