Linux Security and Hardening, The Practical Security Guide

Course

Online

£ 10 + VAT

Description

  • Type

    Course

  • Methodology

    Online

  • Start date

    Different dates available

JOIN THE OTHER 40,000 SUCCESSFUL STUDENTS WHO HAVE ALREADY MASTERED THE LINUX OPERATING SYSTEM WITH ONE OF MY TOP RATED COURSES!Keep yourself and your company out of the news by protecting your Linux systems from hackers, crackers, and attackers!This course will not only teach you the security concepts and guidelines that will keep your Linux servers safe, it will walk you through hardening measures step-by-step.Hello. My name is Jason Cannon and I'm the author of Linux Administration, the founder of the Linux Training Academy, and an instructor to thousands of satisfied students. I started my IT career in the late 1990's as a Unix and Linux System Engineer. I've worked for many technology companies who take information security seriously. I've even worked for security firms such as Mandiant and FireEye. I'll be sharing my real-world Linux security experience with you throughout this course.By the end of this course you will be able to tighten up the security on any Linux system. You'll learn the security weaknesses of the Linux operating system and be given step-by-step instructions on how to protect those weaknesses. You'll even learn some security concepts that apply to information security as a whole while focusing on the Linux specific issues that require special consideration.What People Are Saying About Jason and his Courses:"Excellent course on Linux! It is the best way to get started using Linux that I have come across." --Chris Bischoff"This class was a great review of the 2 Linux classes I took in school. I learned plenty of new stuff and got a great refresher on things I haven't used in some time. I did well on my interview and got the job I was looking for. Thanks!" --Alan Derrick"This was a great course! Learned a lot from it!" --Ricardo José Crosara Junior"Excellent starter course. Very good and complete guide to get you started on working on Linux." --Brian Mulder
used in the lessons. You can download them and refer to them...

Facilities

Location

Start date

Online

Start date

Different dates availableEnrolment now open

About this course

By the end of this course you will be able to harden a Linux system, reduce its surface of vulnerability, and reduce the risk of your Linux system being hacked or compromised

Anyone with a desire to learn how to secure and harden a computer running the Linux operating system
Linux system administrators looking to make the systems they support more secure
People thinking about a career as a Linux system administrator or engineer
This course is not for people who have never used the Linux operating system before

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Reviews

This centre's achievements

2021

All courses are up to date

The average rating is higher than 3.7

More than 50 reviews in the last 12 months

This centre has featured on Emagister for 4 years

Subjects

  • Operating System
  • Linux

Course programme

Course Overview and Downloads 2 lectures 01:25 Course Overview Course Downloads The course download includes the lecture slides as well as additional information security resources. Course Overview and Downloads 2 lectures 01:25 Course Overview Course Downloads The course download includes the lecture slides as well as additional information security resources. Course Overview Course Overview Course Overview Course Overview Course Downloads The course download includes the lecture slides as well as additional information security resources. Course Downloads The course download includes the lecture slides as well as additional information security resources. Course Downloads The course download includes the lecture slides as well as additional information security resources. Course Downloads The course download includes the lecture slides as well as additional information security resources. The course download includes the lecture slides as well as additional information security resources. The course download includes the lecture slides as well as additional information security resources. General Security 5 lectures 21:12 Section Overview Is Linux Secure? What Makes Linux Secure? Security Guidelines and Principles Section Summary General Security - Quiz General Security 5 lectures 21:12 Section Overview Is Linux Secure? What Makes Linux Secure? Security Guidelines and Principles Section Summary General Security - Quiz Section Overview Section Overview Section Overview Section Overview Is Linux Secure? Is Linux Secure? Is Linux Secure? Is Linux Secure? What Makes Linux Secure? What Makes Linux Secure? What Makes Linux Secure? What Makes Linux Secure? Security Guidelines and Principles Security Guidelines and Principles Security Guidelines and Principles Security Guidelines and Principles Section Summary Section Summary Section Summary Section Summary General Security - Quiz General Security - Quiz General Security - Quiz General Security - Quiz Physical Security 11 lectures 47:29 Physical Security Overview Physical Security Concepts Single User Mode Security Single User Mode and Blank Passwords Securing the Boot Loader Disk Encryption Encrypting a New Device, Part I Encrypting a New Device, Part II Encrypting an Existing Device Disabling Control Alt Delete Physical Security Summary Physical Security - Quiz Physical Security 11 lectures 47:29 Physical Security Overview Physical Security Concepts Single User Mode Security Single User Mode and Blank Passwords Securing the Boot Loader Disk Encryption Encrypting a New Device, Part I Encrypting a New Device, Part II Encrypting an Existing Device Disabling Control Alt Delete Physical Security Summary Physical Security - Quiz Physical Security Overview Physical Security Overview Physical Security Overview Physical Security Overview Physical Security Concepts Physical Security Concepts Physical Security Concepts Physical Security Concepts Single User Mode Security Single User Mode Security Single User Mode Security Single User Mode Security Single User Mode and Blank Passwords Single User Mode and Blank Passwords Single User Mode and Blank Passwords Single User Mode and Blank Passwords Securing the Boot Loader Securing the Boot Loader Securing the Boot Loader Securing the Boot Loader Disk Encryption Disk Encryption Disk Encryption Disk Encryption Encrypting a New Device, Part I Encrypting a New Device, Part I Encrypting a New Device, Part I Encrypting a New Device, Part I Encrypting a New Device, Part II Encrypting a New Device, Part II Encrypting a New Device, Part II Encrypting a New Device, Part II Encrypting an Existing Device Encrypting an Existing Device Encrypting an Existing Device Encrypting an Existing Device Disabling Control Alt Delete Disabling Control Alt Delete Disabling Control Alt Delete Disabling Control Alt Delete Physical Security Summary Physical Security Summary Physical Security Summary Physical Security Summary Physical Security - Quiz Physical Security - Quiz Physical Security - Quiz Physical Security - Quiz Account Security 9 lectures 39:49 Account Security Overview Intro to PAM PAM Configuration Example Password Security Account Security Demo #1 (UID 0) Controlling Account Access Security by Account Type Account Security Demo #2 Account Security Demo #3 (Sudo) Account Security - Quiz Account Security File System Security Overview File and Directory Permissions, Intro File and Directory Permissions, Part I File and Directory Permissions, Part II Special Modes, Part I This lesson covers the special modes of setuid, setgid, and the sticky bit. Special Modes, Part II This lesson covers the special modes of setuid, setgid, and the sticky bit. File Attributes File Attributes Demo ACLs ACLs Demo Rootkits Rootkit Hunter Demonstration File System Security Overview File System Security Overview File System Security Overview ...

Additional information

A basic understanding of the Linux operating system. Please consider taking "Learn Linux in 5 Days" before taking this course

Linux Security and Hardening, The Practical Security Guide

£ 10 + VAT