Linux Security and Hardening Essential Training

Go to class
Write Review

Free Online Course: Linux Security and Hardening Essential Training provided by LinkedIn Learning is a comprehensive online course, which lasts for 4-5 hours worth of material. The course is taught in English and is free of charge. Upon completion of the course, you can receive an e-certificate from LinkedIn Learning. Linux Security and Hardening Essential Training is taught by Jason Cannon.

Overview
  • Discover how to tighten security on any Linux system. Learn basic security concepts and guidelines that can help Linux system administrators keep their system safe from attackers.

Syllabus
  • Introduction

    • Welcome
    1. General Security
    • General security
    • Is Linux secure?
    • What makes Linux secure?
    • Security guidelines and principles
    • Section summary: General security
    2. Physical Security
    • Physical security
    • Physical security concepts
    • Single user mode security
    • Single user mode and blank passwords
    • Secure the bootloader
    • Disk encryption
    • Encrypt a new device: Part 1
    • Encrypt a new device: Part 2
    • Encrypt an existing device
    • Disable Control-Alt-Delete
    • Section summary: Physical security
    3. Account Security
    • Account security
    • Introduction to PAM
    • PAM configuration example
    • Password security
    • Account security: Demo 1 (UID 0)
    • Control account access
    • Security by account type
    • Account security: Demo 2
    • Account security: Demo 3 (Sudo)
    4. Network Security
    • Network security
    • Network security: Part 1
    • Network security: Part 2
    • Secure SSHD: Part 1
    • Secure SSHD: Part 2
    • Linux firewall fundamentals
    • Configure the firewall from the command line
    • Firewall rule specifications
    • Example firewall rules
    • Linux firewall demo
    • TCP Wrappers: Part 1
    • TCP Wrappers: Part 2
    5. File System Security
    • File system security
    • Introduction to file and directory permissions
    • File and directory permissions: Part 1
    • File and directory permissions: Part 2
    • Special modes: Part 1
    • Special modes: Part 2
    • File attributes
    • File attributes demo
    • ACLs
    • ACLs demo
    • Rootkits
    • Rootkit hunter demo
    Conclusion
    • Summary