Security & Hardening LINUX

Requirements

A basic understanding of the Linux operating system. Please consider taking “Learn Linux in 5 Days” before taking this course

Description

Keep yourself and your company out of the news by protecting your Linux systems from hackers, crackers, and attacker

This course will not only teach you the security concepts and guidelines that will keep your Linux servers safe, it will walk you through hardening measures step-by-step

Hello. My name is Jason Cannon and I’m the author of Linux Administration, the founder of the Linux Training Academy, and an instructor to thousands of satisfied students. I started my IT career in the late 1990’s as a Unix and Linux System Engineer. I’ve worked for many technology companies who take information security seriously. I’ve even worked for security firms such as Mandiant and FireEye. I’ll be sharing my real-world Linux security experience with you throughout this course

By the end of this course you will be able to tighten up the security on any Linux system. You’ll learn the security weaknesses of the Linux operating system and be given step-by-step instructions on how to protect those weaknesses. You’ll even learn some security concepts that apply to information security as a whole while focusing on the Linux specific issues that require special consideration.

Linux Security and Hardening 

How to protect your Linux systems against hackers

Ways to prevent attackers from breaking into your systems, even when they have physical access to your machine

How to enforce strong password policies and control password as well as account aging policies on your Linux servers

SSH Hardening practices

Network security tactics

Port scanning and network service detection

How the Linux firewall works and exactly how to configure it

How to protect the superuser (root) account

Ways to share accounts securely with an audit trail

File system security and encryption

Using and configuring sudo, and why you need to

Advanced Linux permissions include special modes, file attributes, and access control lists (ACLs)

Much, much more

Who this course is for

Anyone with a desire to learn how to secure and harden a computer running the Linux operating system

Linux system administrators looking to make the systems they support more secure

People thinking about a career as a Linux system administrator or engineer

This course is not for people who have never used the Linux operating system before

مشاركة:

Facebook
Twitter
LinkedIn

قبول ملفات الارتباط

نستخدم ملفات الكوكيز أو البيانات الشخصية المماثلة لتحسين تجربة المستخدم وتخصيص المحتوى المعروض للمستخدم. تعرف ملفات الكوكيز على المعلومات المتعلقة بزياراتك لموقعنا ، وتسهل الوصول إلى خدماتنا. عندما تستخدم موقعنا ، فإنك توافق على استخدام الكوكيز الموضحة في هذه السياسة.