English | Size: 4.71 GB
Genre: eLearning
What you’ll learn
By the end of this course you will be able to apply most of the security measures in your Linux environment
You will be able to pass the Redhat Certified Engineer exam (EX300)
You will reduce the risk of your Linux system being hacked or attacked
You will have expert knowledge of Linux account and system securities
If you have basic understanding of Linux and want to enhance your skill in Linux security and system hardening then this course is perfect fit for you. Many security policies and standards require system administrators to address specific user authentication concerns, application of updates, system auditing and logging, file system integrity, and more. This course provides strategies for addressing specific policy and configuration concerns.
This course is intended to develop the skills needed to ensure data integrity on computer systems for organizations with high security standards.
This course is best for someone who:
wants to learn almost everything about Linux security
wants to step-up in his/her career
is looking for a job in Linux
needs technical guidance on how to enhance the security of Linux systems
is responsible for implementing security policy requirements on Linux systems consistently and in a reproducible way
must be able to demonstrate that Linux systems meet security policy requirements
maintains continued adherence to security requirements, including management of security-critical operating system/software updates
===================================================================================
Overview of the course:
There are total of 10 sections in this course
Section 1 – Introduction and Course Overview
Course Overview
Download Syllabus
Section 2 – Security Concepts
What is Security and OS Hardening?
Comparing House Security with Computer Security
Securing All Operating Systems
Importance of Linux Security
Security Implementation Tools
Type of Security Breach
Quiz, Handouts and Homework
Section 3 – Lab Setup (optional)
What is VirtualBox?
Installing Oracle VirtualBox
Creating First Virtual Machine
Linux Installation
Section 4 – Securing User Environment
Understanding /etc/passwd, /etc/group and /etc/shadow
The /etc/login.def File
Create User Account and Change Password
Change Password Parameters
Set Password Policy
Lock or Disable User Accounts Automatically
Lock or Disable User Accounts Manually
Lock User Account After 3 Failed Attempts
Restrict root Login
Disable SSH Access for a Specific User
Implement UID/GID Policy
Centralized Authentication Service
sudo Access
Monitor User Activity
Section 5 – PAM (Pluggable Authentication Module)
What is PAM?
The Importance of PAM
The PAM Configuration Files Format
PAM Config File – Module Interfaces
Account Access Through PAM
PAM Config File – Control Flags
PAM Config File – Modules (SO)
PAM Aware Services and Stacks
Section 6 – Securing Linux Filesystem
Linux File Types
Linux File Attributes
Linux File Ownership and Permissions
Changing File Permission
Changing File Ownership
Access Control List (ACL)
Section 7 – Securing Linux System
Message of the Day and customizing message of the day
Physical Server Security
Remove Unnecessary or Orphan Packages
Keep Kernel and System Up to Date
Stop and Disable Unwanted Services
Separate Disk Partitions
Disable Ctrl+Alt+Delete
Running One Service per System
Change Default Console Passwords
Disable USB Stick Detection
Enable Network Time Protocol (NTP or Chronyd)
Lockdown Cronjobs
Change SSH Ports
SELinux (longest lecture and lab)
Backups
Section 8 – Securing Linux System Network
Introduction to Firewall
iptables (tables, chains and targets)
iptables (practical examples)
Firewall (firewalld)
firewalld (Practical Examples)
firewalld (GUI)
Encrypt Incoming and Outgoing Traffic
SSH vs. Telnet
Turn Off IPV6 (If not in use)
Section 9 – Securing Environment Around Linux
Hardware/Network Firewall
Network Address Translation (NAT)
VPN Tunnel
Application and Database Encryption
Section 10 – Additional Resources
Many more lectures on Linux…
nitroflare.com/view/DB56B5C501A22CC/Complete-Linux-Security-Hardening-with-Practical-Examples.15.8.part01.rar
nitroflare.com/view/5C1E41C7EAD67B1/Complete-Linux-Security-Hardening-with-Practical-Examples.15.8.part02.rar
nitroflare.com/view/B1152A8F6D3E5D5/Complete-Linux-Security-Hardening-with-Practical-Examples.15.8.part03.rar
nitroflare.com/view/7EEDD37319D0597/Complete-Linux-Security-Hardening-with-Practical-Examples.15.8.part04.rar
nitroflare.com/view/2684F9B4B93BD39/Complete-Linux-Security-Hardening-with-Practical-Examples.15.8.part05.rar
nitroflare.com/view/BD332A41FC42B70/Complete-Linux-Security-Hardening-with-Practical-Examples.15.8.part06.rar
nitroflare.com/view/02DDDF40275F7BC/Complete-Linux-Security-Hardening-with-Practical-Examples.15.8.part07.rar
nitroflare.com/view/99D3C4911F87F33/Complete-Linux-Security-Hardening-with-Practical-Examples.15.8.part08.rar
nitroflare.com/view/6B1A1B718F2CFC5/Complete-Linux-Security-Hardening-with-Practical-Examples.15.8.part09.rar
nitroflare.com/view/D145F10DFB16FD8/Complete-Linux-Security-Hardening-with-Practical-Examples.15.8.part10.rar
rapidgator.net/file/171a180e92de6de14cb2194c52473d61/Complete-Linux-Security-Hardening-with-Practical-Examples.15.8.part01.rar.html
rapidgator.net/file/aba9f46f7ee0347f59a13760f108e0b0/Complete-Linux-Security-Hardening-with-Practical-Examples.15.8.part02.rar.html
rapidgator.net/file/7dc7b659a782e63066c5f0cc491c6690/Complete-Linux-Security-Hardening-with-Practical-Examples.15.8.part03.rar.html
rapidgator.net/file/4e38331911ec961a05ddc2ccf2a7284c/Complete-Linux-Security-Hardening-with-Practical-Examples.15.8.part04.rar.html
rapidgator.net/file/83cd3cdbe956677e7f9b37ee9eaf3c93/Complete-Linux-Security-Hardening-with-Practical-Examples.15.8.part05.rar.html
rapidgator.net/file/8c33b3293cef71b148b05ca49461e417/Complete-Linux-Security-Hardening-with-Practical-Examples.15.8.part06.rar.html
rapidgator.net/file/b9bcfe5f661631377bb6746adb9e87d6/Complete-Linux-Security-Hardening-with-Practical-Examples.15.8.part07.rar.html
rapidgator.net/file/7f5811314a4531dfe7e10817789b9a70/Complete-Linux-Security-Hardening-with-Practical-Examples.15.8.part08.rar.html
rapidgator.net/file/35e80025d895930e50d935f580a8e34f/Complete-Linux-Security-Hardening-with-Practical-Examples.15.8.part09.rar.html
rapidgator.net/file/c250a5213e78370da4c1cd560f8cfe90/Complete-Linux-Security-Hardening-with-Practical-Examples.15.8.part10.rar.html
If any links die or problem unrar, send request to
forms.gle/e557HbjJ5vatekDV9