The Complete Linux Security Training Course: All In One
Published 8/2022
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 789.11 MB | Duration: 1h 37m
Published 8/2022
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 789.11 MB | Duration: 1h 37m
This course will teach you how to secure Linux systems and create a robust environment.
What you'll learn
Understanding Linux Security Problem
Learning various vulnerabilities and exploits in relation to Linux systems
Local Filesystem Security
Configure and build a secure kernel and test it
Explore various ways to authenticate local users while monitoring their activities
Network Security
Security Tools
Linux Security Distros
Security Monitoring and Logging
Understanding Linux Service Security
Scanning & Auditing Linux
Requirements
Basic linux knowledge is helpful but not required
Description
Welcome to this course. Nowadays, system security has gained a lot of momentum and software professionals are focusing heavily on it. Linux is often treated as a highly secure operating system. With the growing popularity of Linux, more and more administrators have started moving to the system to create networks or servers for any task. However, the reality is that Linux has its share of security flaws, and these security flaws allow attackers to get into your system and modify or even destroy your important data. But there’s no need to panic, since there are various mechanisms by which these flaws can be removed, and this course will help you learn about different types of Linux security to create a more secure Linux system.With lots of step-by-step recipes, the course starts by introducing you to various threats to Linux systems. You then get to walk through customizing the Linux kernel and securing local files. Next you will move on to manage user authentication locally and remotely and also mitigate network attacks. Finally, you will learn to patch bash vulnerability and monitor system logs for security.In this course, you'll learn:Understanding Linux Security ProblemConfiguring a Secure and Optimized KernelLearning various vulnerabilities and exploits in relation to Linux systemsLocal Filesystem SecurityLocal Authentication in LinuxConfigure and build a secure kernel and test itLearn about file permissions and security and how to securely modify filesExplore various ways to authenticate local users while monitoring their activities.Remote AuthenticationNetwork SecuritySecurity ToolsLinux Security DistrosBash Vulnerability PatchingSecurity Monitoring and LoggingAuthenticate users remotely and securely copy files on remote systemsReview various network security methods including firewalls using iptables and TCP WrapperUnderstanding Linux Service SecurityScanning & Auditing LinuxExplore various security tools including Port Sentry, Squid Proxy, Shorewall, and many moreUnderstand Bash vulnerability/security and patch managementVulnerability Scanning & Intrusion Detection
Overview
Section 1: Welcome
Lecture 1 Introduction
Section 2: Getting Started
Lecture 2 Introduction
Lecture 3 A Brief Intro to Linux System
Lecture 4 Understanding Ubuntu Package Management
Lecture 5 Understanding RedHat Package Management
Section 3: Understanding the Linux Boot Process
Lecture 6 Introduction
Lecture 7 Learn and Understand GRUB
Lecture 8 Learn and Understand xinetd
Section 4: Learn and Understand Linux Services
Lecture 9 Services - Standard Postfix Configuration
Lecture 10 Services - Apache Configuration
Lecture 11 Services - Hardening Apache
Lecture 12 Learning Virtual Hosts
Lecture 13 Learn About DNSSec
Lecture 14 Learn About MySQL
Lecture 15 Learn About PostgreSQL
Lecture 16 Learn About Tomcat
Lecture 17 Learn About JBoss
Lecture 18 Learn About mod_security
Lecture 19 Learning SSL-TLS & Apache
Lecture 20 Learning Greylisting & SPF
Linux administrators,System administrators,Network engineers,Anyone interested in securing moderate to complex Linux environments