Example Image with Text
Use this Image with Text block to balance out your text content with a complementary visual to strengthen messaging and help your students connect with your product, course, or coaching. You can introduce yourself with a profile picture and author bio, showcase a student testimonial with their smiling face, or highlight an experience with a screenshot.
Example Text
Use this Text block to tell your course or coaching’s story.
Write anything from one-liners to detailed paragraphs that tell your visitors more about what you’re selling.
This block - along with other blocks that contain text content - supports various text formatting such as header sizes, font styles, alignment, ordered and unordered lists, hyperlinks and colors.
Example Title
Use this block to showcase testimonials, features, categories, or more. Each column has its own individual text field. You can also leave the text blank to have it display nothing and just showcase an image.
Example Title
Use this block to showcase testimonials, features, categories, or more. Each column has its own individual text field. You can also leave the text blank to have it display nothing and just showcase an image.
Example Title
Use this block to showcase testimonials, features, categories, or more. Each column has its own individual text field. You can also leave the text blank to have it display nothing and just showcase an image.
Example Curriculum
- 1.Welcome to Securing Environment Around Linux (0:09)
- 2.Understanding etcpasswd (10:09)
- 3.Understanding etcgroup (5:42)
- 4.Understanding etcshadow (6:54)
- 5.The etclogin.def File (5:36)
- 6.Create User Account and Change Password (8:47)
- 7.Change Password Parameters (8:25)
- 8.Set Password Policy (12:21)
- 9.Lock or Disable User Accounts (7:28)
- 10.Lock or Disable User Accounts Manually (7:06)
- 11.Lock User Account After 3 Failed Attempts (9:08)
- 12.Restrict root Login (7:49)
- 13.Disable SSH Access for a Specific User (5:31)
- 14.Implement UIDGID Policy (7:31)
- 15.Centralized Authentication Service (5:13)
- 16.sudo Access (19:22)
- 17.Monitor User Activity (21:59)
- 1.Welcome to PAM (0:06)
- 2.What is PAM (9:12)
- 3.The Importance of PAM (4:06)
- 4.The PAM Configuration Files Format (4:41)
- 5.PAM Config File _ Module Interfaces (5:20)
- 6.Account Access Through PAM (1:34)
- 7.PAM Config File _ Control Flags (3:11)
- 8.PAM Config File _ Modules _SO (10:35)
- 9.PAM Aware Services and Stacks (7:39)
- 1.Welcome to Securing Linux System (0:09)
- 2.Message of the Day (7:30)
- 3.Customize Message of the Day (10:36)
- 4.Physical Server Security (4:22)
- 5.Remove Un-necessary or Orphan Packages (11:54)
- 6.Keep Kernel and System Up to Date (12:20)
- 7.Stop and Disable Unwanted Services (15:28)
- 8.Separate Disk Partitions (6:21)
- 9.Disable Ctrl_Alt_Delete (8:43)
- 10.Running One Service per System (4:41)
- 11.Change Default Console Passwords _Only Physical (5:01)
- 12.Disable USB Stick Detection (2:26)
- 13.Enable an Network Time Protocol _NTP or Chronyd (15:40)
- 14.Lockdown Cronjobs (7:09)
- 15.Change SSH Port (8:54)
- 16.SELinux (35:35)
- 17.Backups (7:12)
- 1.Welcome to Securing Linux Network (0:09)
- 2.Introduction to Firewall (4:22)
- 3.Firewall _iptables _ tables_ chains and targets (10:49)
- 4.Firewall _iptables _ practical examples (24:10)
- 5.Firewall _firewalld (8:53)
- 6.Firewall _firewalld _ Practical Examples (23:35)
- 7.Firewall _firewalld GUI (5:09)
- 8.Encrypt Incoming and Outgoing Traffic (3:50)
- 9.SSH vs. Telnet (10:08)
- 10.Turn Off IPV6 _If not in use (6:25)
- 1.Welcome to Additional Resources (0:09)
- 2.Getting Linux Commands Help (5:02)
- 3.Compress and Uncompress Files (9:42)
- 4.Absolute and Relative Path (5:03)
- 5.Changing Password (4:36)
- 6.sed Command Examples (21:00)
- 7.Talking to Users (8:30)
- 8.Wildcards (10:02)
- 9.Hard and Soft Link (12:28)
- 10.User Directory Authentication (5:50)
- 11.Difference AD_ openLDAP_ WinBind etc (8:34)
- 12.System Log Monitor (11:08)
- 13.Recover Root Password (5:26)
- 14.File Transfer Commands (10:25)
- 15.NIC Bonding (17:42)
- 16.Advance Package Management (15:01)
- 17.File System Check (16:43)
- 18.Compress and uncompress (9:42)
- 19.File Maintenace Commands (11:44)
- 20.File Ownership Commands (11:35)
- 21.Environment Variable (13:35)
- 22.Linux File Editor - vi (14:32)
- 23.Process Management (14:08)
- 24.User Account Management (15:01)
- 25.Create Local Yum Repo (14:02)
- 26.Securing Linux Machine - Quick Recap (24:26)
Example Image with Text
Use this Image with Text block to balance out your text content with a complementary visual to strengthen messaging and help your students connect with your product, course, or coaching. You can introduce yourself with a profile picture and author bio, showcase a student testimonial with their smiling face, or highlight an experience with a screenshot.
Example Featured Products
Showcase other available courses, bundles, and coaching products you’re selling with the Featured Products block to provide alternatives to visitors who may not be interested in this specific product.