This course was created with the
course builder. Create your online course today.
Start now
Create your course
with
Autoplay
Autocomplete
Previous Lesson
Complete and Continue
A Complete Linux Security Concepts with Practical Examples
1. INTRODUCTION
1.Syllabus Overiew (7:41)
2.Thank You (0:59)
2. SECURITY CONCEPTS
1.Welcome to Security Concepts (0:09)
2.What is Security and OS Hardening (4:07)
3.Comparing House Security with Computer Security (3:27)
4.Securing All Operating Systems (3:11)
5.Importance of Linux Security (6:20)
6.Security Implementation Tools (5:43)
7.Type of Security Breach (4:19)
3. LAB SETUP
1.Welcome to Lab Setup (2:48)
2.What is Oracle VirtualBox (1:51)
3.Downloading and Installing Oracle VirtualBox (6:05)
4.Creating First Virtual Machine (5:33)
5.Linux Installation (25:05)
4. SECURING USER ENVIRONMENT
1.Welcome to Securing Environment Around Linux (0:09)
2.Understanding etcpasswd (10:09)
3.Understanding etcgroup (5:42)
4.Understanding etcshadow (6:54)
5.The etclogin.def File (5:36)
6.Create User Account and Change Password (8:47)
7.Change Password Parameters (8:25)
8.Set Password Policy (12:21)
9.Lock or Disable User Accounts (7:28)
10.Lock or Disable User Accounts Manually (7:06)
11.Lock User Account After 3 Failed Attempts (9:08)
12.Restrict root Login (7:49)
13.Disable SSH Access for a Specific User (5:31)
14.Implement UIDGID Policy (7:31)
15.Centralized Authentication Service (5:13)
16.sudo Access (19:22)
17.Monitor User Activity (21:59)
5. PAM (PLUGGABLE AUTHENTICATION MODULE)
1.Welcome to PAM (0:06)
2.What is PAM (9:12)
3.The Importance of PAM (4:06)
4.The PAM Configuration Files Format (4:41)
5.PAM Config File _ Module Interfaces (5:20)
6.Account Access Through PAM (1:34)
7.PAM Config File _ Control Flags (3:11)
8.PAM Config File _ Modules _SO (10:35)
9.PAM Aware Services and Stacks (7:39)
6. SECURING LINUX FILESYSTEM
1.Welcome to Securing Linux Filesystem (0:09)
2.Linux File Types (5:14)
3.Linux File Attributes (2:43)
4.Linux File Ownership and Permissions (4:01)
5.Changing File Permission - LAB (11:55)
6.Changing FIle Ownership - LAB (12:26)
7.Access Control List _ACL_ (13:07)
7. SECURING LINUX SYSTEM
1.Welcome to Securing Linux System (0:09)
2.Message of the Day (7:30)
3.Customize Message of the Day (10:36)
4.Physical Server Security (4:22)
5.Remove Un-necessary or Orphan Packages (11:54)
6.Keep Kernel and System Up to Date (12:20)
7.Stop and Disable Unwanted Services (15:28)
8.Separate Disk Partitions (6:21)
9.Disable Ctrl_Alt_Delete (8:43)
10.Running One Service per System (4:41)
11.Change Default Console Passwords _Only Physical (5:01)
12.Disable USB Stick Detection (2:26)
13.Enable an Network Time Protocol _NTP or Chronyd (15:40)
14.Lockdown Cronjobs (7:09)
15.Change SSH Port (8:54)
16.SELinux (35:35)
17.Backups (7:12)
8. SECURING LINUX SYSTEM NETWORK
1.Welcome to Securing Linux Network (0:09)
2.Introduction to Firewall (4:22)
3.Firewall _iptables _ tables_ chains and targets (10:49)
4.Firewall _iptables _ practical examples (24:10)
5.Firewall _firewalld (8:53)
6.Firewall _firewalld _ Practical Examples (23:35)
7.Firewall _firewalld GUI (5:09)
8.Encrypt Incoming and Outgoing Traffic (3:50)
9.SSH vs. Telnet (10:08)
10.Turn Off IPV6 _If not in use (6:25)
9. SECURING ENVIRONMENT AROUND LINUX
1.Welcome to Securing Environment Around Linux (0:09)
2.HardwareNetwork Firewall (6:16)
3.Network Address Translation _NAT (4:05)
4.VPN Tunnel (6:03)
5.Application and Database Encryption (4:07)
6.Types of Security Threats (18:10)
7.Congratulations (0:15)
10. ADDITIONAL RESOURCES
1.Welcome to Additional Resources (0:09)
2.Getting Linux Commands Help (5:02)
3.Compress and Uncompress Files (9:42)
4.Absolute and Relative Path (5:03)
5.Changing Password (4:36)
6.sed Command Examples (21:00)
7.Talking to Users (8:30)
8.Wildcards (10:02)
9.Hard and Soft Link (12:28)
10.User Directory Authentication (5:50)
11.Difference AD_ openLDAP_ WinBind etc (8:34)
12.System Log Monitor (11:08)
13.Recover Root Password (5:26)
14.File Transfer Commands (10:25)
15.NIC Bonding (17:42)
16.Advance Package Management (15:01)
17.File System Check (16:43)
18.Compress and uncompress (9:42)
19.File Maintenace Commands (11:44)
20.File Ownership Commands (11:35)
21.Environment Variable (13:35)
22.Linux File Editor - vi (14:32)
23.Process Management (14:08)
24.User Account Management (15:01)
25.Create Local Yum Repo (14:02)
26.Securing Linux Machine - Quick Recap (24:26)
11. BONUS SECTION
1.Welcome to Bonus Section (0:09)
2.Discounted Course Coupons (1:15)
3.Other Services (3:21)
2.Discounted Course Coupons
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock