Cloud Academy – Linux Security and Hardening

Cloud Academy – Linux Security and Hardening
English | Size: 1.53 GB
Category: Tutorial


This learning path is a deep dive into Linux security and provides a comprehensive overview of the key areas that you need to know to secure your Linux systems!

We start by taking a look at Linux security in general before moving on to physical security and the countermeasures you can employ to protect your hardware. From there, we look at authentication systems and the various account types on a Linux system, and how to secure each one. You’ll also learn how to enforce strong passwords and manage account and password expirations.

In the networking section, you’ll learn how to secure network services that run on Linux systems. You’ll also learn how the local firewall works in Linux and how to configure it. We’ll cover file system security and how permissions work in detail, including special modes, file attributes, and ACLs. You’ll also learn what rootkits are, how to detect them, and how to remove them.

This learning path also includes several security resources you can use to continue your security education and stay on top of the latest security issues for your Linux distribution.
Learning Objectives

Get a general view of Linux security including roles, network services, encryption, accounts, and multifactor authentication
Learn specific strategies for mitigating physical security risks and protecting your Linux systems against the most common physical attacks
Learn about data encryption and how to implement it on new Linux systems, as well as those that are already in service
Understand the different types of accounts you’ll find on a Linux system and the special precautions you need to take with each account type
Learn how to enforce good password security practices on your Linux systems
Learn about multi-factor authentication and how it can be implemented in Linux
Learn techniques and strategies to secure network services
Learn how to secure your files and directories on Linux through permissions, data sharing, special modes, file attributes, ACLs, and rootkits

Intended Audience

This learning path is intended for anyone who wants to understand how to secure their Linux systems or enhance existing their existing security.
Prerequisites

To get the most out of this course, you should already have a good working knowledge of Linux. If you want to brush up on your Linux skills, consider taking our Learn Linux in 5 Days learning path first.

Buy Long-term Premium Accounts To Support Me & Max Speed


RAPIDGATOR
rapidgator.net/file/fef764e27337629975b5e23e607941e6/CA3023.part1.rar.html
rapidgator.net/file/107b1d7cc3e3da68d500f018bc80e803/CA3023.part2.rar.html
rapidgator.net/file/59006491a8bef30e6bcc2aff68c0f712/CA3023.part3.rar.html

NITROFLARE
nitro.download/view/A533306AF9808FE/CA3023.part1.rar
nitro.download/view/7237F76A664F9C0/CA3023.part2.rar
nitro.download/view/758DE364C7529FF/CA3023.part3.rar

If any links die or problem unrar, send request to goo.gl/aUHSZc

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.