Complete Linux Security & Hardening with Practical Examples | Udemy


Complete Linux Security & Hardening with Practical Examples | Udemy [Update 11/2021]
English | Size: 3.73 GB
Genre: eLearning

The Best Linux Security Course that prepare you to protects your Systems from attacks by hackers. Helps in RHCSA & RHCE

What you’ll learn
By the end of this course you will be able to apply most of the security measures in your Linux environment
You will be able to pass the Redhat Certified Engineer exam (EX300)
You will reduce the risk of your Linux system being hacked or attacked
You will have expert knowledge of Linux account and system securities

If you have basic understanding of Linux and want to enhance your skill in Linux security and system hardening then this course is perfect fit for you.  Many security policies and standards require system administrators to address specific user authentication concerns, application of updates, system auditing and logging, file system integrity, and more. This course provides strategies for addressing specific policy and configuration concerns.

This course is intended to develop the skills needed to ensure data integrity on computer systems for organizations with high security standards.

I have 35,000+ students on Udemy platform and many of them are able to secure their dream job in IT field just by taking my courses.  I always start with basic and then dive into advance level

This course is best for someone who:

  • wants to learn almost everything about Linux security
  • wants to step-up in his/her career
  • is looking for a job in Linux
  • needs technical guidance on how to enhance the security of Linux systems
  • is responsible for implementing security policy requirements on Linux systems consistently and in a reproducible way
  • must be able to demonstrate that Linux systems meet security policy requirements
  • maintains continued adherence to security requirements, including management of security-critical operating system/software updates

===================================================================================

Overview of the course:

There are total of 10 sections in this course

Section 1 – Introduction and Course Overview

  • Course Overview
  • Download Syllabus

Section 2 – Security Concepts

  • What is Security and OS Hardening?
  • Comparing House Security with Computer Security
  • Securing All Operating Systems
  • Importance of Linux Security
  • Security Implementation Tools
  • Type of Security Breach
  • Quiz, Handouts and Homework

Section 3 – Lab Setup (optional)

  • What is VirtualBox?
  • Installing Oracle VirtualBox
  • Creating First Virtual Machine
  • Linux Installation

Section 4 – Securing User Environment

  • Understanding /etc/passwd, /etc/group and /etc/shadow
  • The /etc/login.def File
  • Create User Account and Change Password
  • Change Password Parameters
  • Set Password Policy
  • Lock or Disable User Accounts Automatically
  • Lock or Disable User Accounts Manually
  • Lock User Account After 3 Failed Attempts
  • Restrict root Login
  • Disable SSH Access for a Specific User
  • Implement UID/GID Policy
  • Centralized Authentication Service
  • sudo Access
  • Monitor User Activity

Section 5 – PAM (Pluggable Authentication Module)

  • What is PAM?
  • The Importance of PAM
  • The PAM Configuration Files Format
  • PAM Config File – Module Interfaces
  • Account Access Through PAM
  • PAM Config File – Control Flags
  • PAM Config File – Modules (SO)
  • PAM Aware Services and Stacks

Section 6 – Securing Linux Filesystem

  • Linux File Types
  • Linux File Attributes
  • Linux File Ownership and Permissions
  • Changing File Permission
  • Changing File Ownership
  • Access Control List (ACL)

Section 7 – Securing Linux System

  • Message of the Day and customizing message of the day
  • Physical Server Security
  • Remove Unnecessary or Orphan Packages
  • Keep Kernel and System Up to Date
  • Stop and Disable Unwanted Services
  • Separate Disk Partitions
  • Disable Ctrl+Alt+Delete
  • Running One Service per System
  • Change Default Console Passwords
  • Disable USB Stick Detection
  • Enable Network Time Protocol (NTP or Chronyd)
  • Lockdown Cronjobs
  • Change SSH Ports
  • SELinux (longest lecture and lab)
  • Backups

Section 8 – Securing Linux System Network

  • Introduction to Firewall
  • iptables (tables, chains and targets)
  • iptables (practical examples)
  • Firewall (firewalld)
  • firewalld (Practical Examples)
  • firewalld (GUI)
  • Encrypt Incoming and Outgoing Traffic
  • SSH vs. Telnet
  • Turn Off IPV6 (If not in use)

Section 9 – Securing Environment Around Linux

  • Hardware/Network Firewall
  • Network Address Translation (NAT)
  • VPN Tunnel
  • Application and Database Encryption

Section 10 – Additional Resources

  • Many more lectures on Linux…

===================================================================================

Who this course is for:
Anyone who wants to have complete understanding Linux security and OS hardening
Anyone who wants to advance his/her career
Anyone who wants to pass the RHCE EX300 exam

nitroflare.com/view/851F88C5A3BD73D/UD-Complete-Linux-Security–Hardening-with-Practical-Examples.part01.rar
nitroflare.com/view/A3B76E88E524004/UD-Complete-Linux-Security–Hardening-with-Practical-Examples.part02.rar
nitroflare.com/view/F5B61496C004619/UD-Complete-Linux-Security–Hardening-with-Practical-Examples.part03.rar
nitroflare.com/view/EAB799B6E54395F/UD-Complete-Linux-Security–Hardening-with-Practical-Examples.part04.rar
nitroflare.com/view/B1437BA03DE26D8/UD-Complete-Linux-Security–Hardening-with-Practical-Examples.part05.rar
nitroflare.com/view/66CC660ECA47EE1/UD-Complete-Linux-Security–Hardening-with-Practical-Examples.part06.rar
nitroflare.com/view/ABF164B4AFB66CB/UD-Complete-Linux-Security–Hardening-with-Practical-Examples.part07.rar
nitroflare.com/view/BD90B2EE0FA7B7A/UD-Complete-Linux-Security–Hardening-with-Practical-Examples.part08.rar
nitroflare.com/view/9E7C84AAB77756F/UD-Complete-Linux-Security–Hardening-with-Practical-Examples.part09.rar
nitroflare.com/view/AF4B3E913003245/UD-Complete-Linux-Security–Hardening-with-Practical-Examples.part10.rar

rapidgator.net/file/2a8fd42f5c688a69243cec135ca5a29d/UD-Complete-Linux-Security–Hardening-with-Practical-Examples.part01.rar.html
rapidgator.net/file/ffb072d089a918804b0d2a3019013ce8/UD-Complete-Linux-Security–Hardening-with-Practical-Examples.part02.rar.html
rapidgator.net/file/d05057abd1d0dafe85e792759d0d6c69/UD-Complete-Linux-Security–Hardening-with-Practical-Examples.part03.rar.html
rapidgator.net/file/803a705009926328ee4c794b5215667d/UD-Complete-Linux-Security–Hardening-with-Practical-Examples.part04.rar.html
rapidgator.net/file/932981b4fe98c6e2285b80dcb15f4c3c/UD-Complete-Linux-Security–Hardening-with-Practical-Examples.part05.rar.html
rapidgator.net/file/74fc8350c0a3da2d1b0e1c6065eafdd1/UD-Complete-Linux-Security–Hardening-with-Practical-Examples.part06.rar.html
rapidgator.net/file/799fdfdfda22561ca3af861366566aea/UD-Complete-Linux-Security–Hardening-with-Practical-Examples.part07.rar.html
rapidgator.net/file/17dbefa39ecd8434a562ec53b4263f04/UD-Complete-Linux-Security–Hardening-with-Practical-Examples.part08.rar.html
rapidgator.net/file/be714cd0a2f32d36e053888ce4e948c6/UD-Complete-Linux-Security–Hardening-with-Practical-Examples.part09.rar.html
rapidgator.net/file/403df5106452bf4a082e93276f90ccff/UD-Complete-Linux-Security–Hardening-with-Practical-Examples.part10.rar.html

If any links die or problem unrar, send request to
forms.gle/e557HbjJ5vatekDV9

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.