Tags
Language
Tags
December 2024
Su Mo Tu We Th Fr Sa
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 31 1 2 3 4

The Complete Linux Security Training Course: All In One

Posted By: ELK1nG
The Complete Linux Security Training Course: All In One

The Complete Linux Security Training Course: All In One
Published 8/2022
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 789.11 MB | Duration: 1h 37m

This course will teach you how to secure Linux systems and create a robust environment.

What you'll learn
Understanding Linux Security Problem
Learning various vulnerabilities and exploits in relation to Linux systems
Local Filesystem Security
Configure and build a secure kernel and test it
Explore various ways to authenticate local users while monitoring their activities
Network Security
Security Tools
Linux Security Distros
Security Monitoring and Logging
Understanding Linux Service Security
Scanning & Auditing Linux
Requirements
Basic linux knowledge is helpful but not required
Description
Welcome to this course. Nowadays, system security has gained a lot of momentum and software professionals are focusing heavily on it. Linux is often treated as a highly secure operating system. With the growing popularity of Linux, more and more administrators have started moving to the system to create networks or servers for any task. However, the reality is that Linux has its share of security flaws, and these security flaws allow attackers to get into your system and modify or even destroy your important data. But there’s no need to panic, since there are various mechanisms by which these flaws can be removed, and this course will help you learn about different types of Linux security to create a more secure Linux system.With lots of step-by-step recipes, the course starts by introducing you to various threats to Linux systems. You then get to walk through customizing the Linux kernel and securing local files. Next you will move on to manage user authentication locally and remotely and also mitigate network attacks. Finally, you will learn to patch bash vulnerability and monitor system logs for security.In this course, you'll learn:Understanding Linux Security ProblemConfiguring a Secure and Optimized KernelLearning various vulnerabilities and exploits in relation to Linux systemsLocal Filesystem SecurityLocal Authentication in LinuxConfigure and build a secure kernel and test itLearn about file permissions and security and how to securely modify filesExplore various ways to authenticate local users while monitoring their activities.Remote AuthenticationNetwork SecuritySecurity ToolsLinux Security DistrosBash Vulnerability PatchingSecurity Monitoring and LoggingAuthenticate users remotely and securely copy files on remote systemsReview various network security methods including firewalls using iptables and TCP WrapperUnderstanding Linux Service SecurityScanning & Auditing LinuxExplore various security tools including Port Sentry, Squid Proxy, Shorewall, and many moreUnderstand Bash vulnerability/security and patch managementVulnerability Scanning & Intrusion Detection

Overview

Section 1: Welcome

Lecture 1 Introduction

Section 2: Getting Started

Lecture 2 Introduction

Lecture 3 A Brief Intro to Linux System

Lecture 4 Understanding Ubuntu Package Management

Lecture 5 Understanding RedHat Package Management

Section 3: Understanding the Linux Boot Process

Lecture 6 Introduction

Lecture 7 Learn and Understand GRUB

Lecture 8 Learn and Understand xinetd

Section 4: Learn and Understand Linux Services

Lecture 9 Services - Standard Postfix Configuration

Lecture 10 Services - Apache Configuration

Lecture 11 Services - Hardening Apache

Lecture 12 Learning Virtual Hosts

Lecture 13 Learn About DNSSec

Lecture 14 Learn About MySQL

Lecture 15 Learn About PostgreSQL

Lecture 16 Learn About Tomcat

Lecture 17 Learn About JBoss

Lecture 18 Learn About mod_security

Lecture 19 Learning SSL-TLS & Apache

Lecture 20 Learning Greylisting & SPF

Linux administrators,System administrators,Network engineers,Anyone interested in securing moderate to complex Linux environments