Complete Linux Security & Hardening with Practical Examples | Udemy


Complete Linux Security & Hardening with Practical Examples | Udemy
English | Size: 4.71 GB
Genre: eLearning

What you’ll learn
By the end of this course you will be able to apply most of the security measures in your Linux environment
You will be able to pass the Redhat Certified Engineer exam (EX300)
You will reduce the risk of your Linux system being hacked or attacked
You will have expert knowledge of Linux account and system securities

If you have basic understanding of Linux and want to enhance your skill in Linux security and system hardening then this course is perfect fit for you. Many security policies and standards require system administrators to address specific user authentication concerns, application of updates, system auditing and logging, file system integrity, and more. This course provides strategies for addressing specific policy and configuration concerns.

This course is intended to develop the skills needed to ensure data integrity on computer systems for organizations with high security standards.

This course is best for someone who:

wants to learn almost everything about Linux security

wants to step-up in his/her career

is looking for a job in Linux

needs technical guidance on how to enhance the security of Linux systems

is responsible for implementing security policy requirements on Linux systems consistently and in a reproducible way

must be able to demonstrate that Linux systems meet security policy requirements

maintains continued adherence to security requirements, including management of security-critical operating system/software updates

===================================================================================

Overview of the course:

There are total of 10 sections in this course

Section 1 – Introduction and Course Overview

Course Overview

Download Syllabus

Section 2 – Security Concepts

What is Security and OS Hardening?

Comparing House Security with Computer Security

Securing All Operating Systems

Importance of Linux Security

Security Implementation Tools

Type of Security Breach

Quiz, Handouts and Homework

Section 3 – Lab Setup (optional)

What is VirtualBox?

Installing Oracle VirtualBox

Creating First Virtual Machine

Linux Installation

Section 4 – Securing User Environment

Understanding /etc/passwd, /etc/group and /etc/shadow

The /etc/login.def File

Create User Account and Change Password

Change Password Parameters

Set Password Policy

Lock or Disable User Accounts Automatically

Lock or Disable User Accounts Manually

Lock User Account After 3 Failed Attempts

Restrict root Login

Disable SSH Access for a Specific User

Implement UID/GID Policy

Centralized Authentication Service

sudo Access

Monitor User Activity

Section 5 – PAM (Pluggable Authentication Module)

What is PAM?

The Importance of PAM

The PAM Configuration Files Format

PAM Config File – Module Interfaces

Account Access Through PAM

PAM Config File – Control Flags

PAM Config File – Modules (SO)

PAM Aware Services and Stacks

Section 6 – Securing Linux Filesystem

Linux File Types

Linux File Attributes

Linux File Ownership and Permissions

Changing File Permission

Changing File Ownership

Access Control List (ACL)

Section 7 – Securing Linux System

Message of the Day and customizing message of the day

Physical Server Security

Remove Unnecessary or Orphan Packages

Keep Kernel and System Up to Date

Stop and Disable Unwanted Services

Separate Disk Partitions

Disable Ctrl+Alt+Delete

Running One Service per System

Change Default Console Passwords

Disable USB Stick Detection

Enable Network Time Protocol (NTP or Chronyd)

Lockdown Cronjobs

Change SSH Ports

SELinux (longest lecture and lab)

Backups

Section 8 – Securing Linux System Network

Introduction to Firewall

iptables (tables, chains and targets)

iptables (practical examples)

Firewall (firewalld)

firewalld (Practical Examples)

firewalld (GUI)

Encrypt Incoming and Outgoing Traffic

SSH vs. Telnet

Turn Off IPV6 (If not in use)

Section 9 – Securing Environment Around Linux

Hardware/Network Firewall

Network Address Translation (NAT)

VPN Tunnel

Application and Database Encryption

Section 10 – Additional Resources

Many more lectures on Linux…

nitroflare.com/view/DB56B5C501A22CC/Complete-Linux-Security-Hardening-with-Practical-Examples.15.8.part01.rar
nitroflare.com/view/5C1E41C7EAD67B1/Complete-Linux-Security-Hardening-with-Practical-Examples.15.8.part02.rar
nitroflare.com/view/B1152A8F6D3E5D5/Complete-Linux-Security-Hardening-with-Practical-Examples.15.8.part03.rar
nitroflare.com/view/7EEDD37319D0597/Complete-Linux-Security-Hardening-with-Practical-Examples.15.8.part04.rar
nitroflare.com/view/2684F9B4B93BD39/Complete-Linux-Security-Hardening-with-Practical-Examples.15.8.part05.rar
nitroflare.com/view/BD332A41FC42B70/Complete-Linux-Security-Hardening-with-Practical-Examples.15.8.part06.rar
nitroflare.com/view/02DDDF40275F7BC/Complete-Linux-Security-Hardening-with-Practical-Examples.15.8.part07.rar
nitroflare.com/view/99D3C4911F87F33/Complete-Linux-Security-Hardening-with-Practical-Examples.15.8.part08.rar
nitroflare.com/view/6B1A1B718F2CFC5/Complete-Linux-Security-Hardening-with-Practical-Examples.15.8.part09.rar
nitroflare.com/view/D145F10DFB16FD8/Complete-Linux-Security-Hardening-with-Practical-Examples.15.8.part10.rar

rapidgator.net/file/171a180e92de6de14cb2194c52473d61/Complete-Linux-Security-Hardening-with-Practical-Examples.15.8.part01.rar.html
rapidgator.net/file/aba9f46f7ee0347f59a13760f108e0b0/Complete-Linux-Security-Hardening-with-Practical-Examples.15.8.part02.rar.html
rapidgator.net/file/7dc7b659a782e63066c5f0cc491c6690/Complete-Linux-Security-Hardening-with-Practical-Examples.15.8.part03.rar.html
rapidgator.net/file/4e38331911ec961a05ddc2ccf2a7284c/Complete-Linux-Security-Hardening-with-Practical-Examples.15.8.part04.rar.html
rapidgator.net/file/83cd3cdbe956677e7f9b37ee9eaf3c93/Complete-Linux-Security-Hardening-with-Practical-Examples.15.8.part05.rar.html
rapidgator.net/file/8c33b3293cef71b148b05ca49461e417/Complete-Linux-Security-Hardening-with-Practical-Examples.15.8.part06.rar.html
rapidgator.net/file/b9bcfe5f661631377bb6746adb9e87d6/Complete-Linux-Security-Hardening-with-Practical-Examples.15.8.part07.rar.html
rapidgator.net/file/7f5811314a4531dfe7e10817789b9a70/Complete-Linux-Security-Hardening-with-Practical-Examples.15.8.part08.rar.html
rapidgator.net/file/35e80025d895930e50d935f580a8e34f/Complete-Linux-Security-Hardening-with-Practical-Examples.15.8.part09.rar.html
rapidgator.net/file/c250a5213e78370da4c1cd560f8cfe90/Complete-Linux-Security-Hardening-with-Practical-Examples.15.8.part10.rar.html

If any links die or problem unrar, send request to
forms.gle/e557HbjJ5vatekDV9

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.