JOIN THE OTHER 40,000 SUCCESSFUL STUDENTS WHO HAVE ALREADY MASTERED THE LINUX OPERATING SYSTEM WITH ONE OF MY TOP RATED COURSES!Keep yourself and your company out of the news by protecting your Linux systems from hackers, crackers, and attackers!This course will not only teach you the security concepts and guidelines that will keep your Linux servers safe, it will walk you through hardening measures step-by-step.Hello. My name is Jason Cannon and I'm the author of Linux Administration, the founder of the Linux Training Academy, and an instructor to thousands of satisfied students. I started my IT career in the late 1990's as a Unix and Linux System Engineer. I've worked for many technology companies who take information security seriously. I've even worked for security firms such as Mandiant and FireEye. I'll be sharing my real-world Linux security experience with you throughout this course.By the end of this course you will be able to tighten up the security on any Linux system. You'll learn the security weaknesses of the Linux operating system and be given step-by-step instructions on how to protect those weaknesses. You'll even learn some security concepts that apply to information security as a whole while focusing on the Linux specific issues that require special consideration.What People Are Saying About Jason and his Courses:"Excellent course on Linux! It is the best way to get started using Linux that I have come across." --Chris Bischoff"This class was a great review of the 2 Linux classes I took in school. I learned plenty of new stuff and got a great refresher on things I haven't used in some time. I did well on my interview and got the job I was looking for. Thanks!" --Alan Derrick"This was a great course! Learned a lot from it!" --Ricardo José Crosara Junior"Excellent starter course. Very good and complete guide to get you started on working on Linux." --Brian Mulder
used in the lessons. You can download them and refer to them...
Facilities
Location
Start date
Online
Start date
Different dates availableEnrolment now open
About this course
By the end of this course you will be able to harden a Linux system, reduce its surface of vulnerability, and reduce the risk of your Linux system being hacked or compromised
Anyone with a desire to learn how to secure and harden a computer running the Linux operating system
Linux system administrators looking to make the systems they support more secure
People thinking about a career as a Linux system administrator or engineer
This course is not for people who have never used the Linux operating system before
Questions & Answers
Add your question
Our advisors and other users will be able to reply to you
We are verifying your question adjusts to our publishing rules. According to your answers, we noticed you might not be elegible to enroll into this course, possibly because of: qualification requirements, location or others. It is important you consult this with the Centre.
Thank you!
We are reviewing your question. We will publish it shortly.
Or do you prefer the center to contact you?
Reviews
Have you taken this course? Share your opinion
This centre's achievements
2021
All courses are up to date
The average rating is higher than 3.7
More than 50 reviews in the last 12 months
This centre has featured on Emagister for 4 years
Subjects
Operating System
Linux
Course programme
Course Overview and Downloads
2 lectures01:25Course OverviewCourse Downloads The course download includes the lecture slides as well as additional information security resources.
Course Overview and Downloads
2 lectures01:25Course OverviewCourse Downloads The course download includes the lecture slides as well as additional information security resources.
Course OverviewCourse OverviewCourse OverviewCourse OverviewCourse Downloads The course download includes the lecture slides as well as additional information security resources.
Course Downloads The course download includes the lecture slides as well as additional information security resources.
Course Downloads The course download includes the lecture slides as well as additional information security resources.
Course Downloads The course download includes the lecture slides as well as additional information security resources.
The course download includes the lecture slides as well as additional information security resources.
The course download includes the lecture slides as well as additional information security resources.
General Security
5 lectures21:12Section OverviewIs Linux Secure?What Makes Linux Secure?Security Guidelines and PrinciplesSection SummaryGeneral Security - Quiz
General Security
5 lectures21:12Section OverviewIs Linux Secure?What Makes Linux Secure?Security Guidelines and PrinciplesSection SummaryGeneral Security - QuizSection OverviewSection OverviewSection OverviewSection OverviewIs Linux Secure?Is Linux Secure?Is Linux Secure?Is Linux Secure?What Makes Linux Secure?What Makes Linux Secure?What Makes Linux Secure?What Makes Linux Secure?Security Guidelines and PrinciplesSecurity Guidelines and PrinciplesSecurity Guidelines and PrinciplesSecurity Guidelines and PrinciplesSection SummarySection SummarySection SummarySection SummaryGeneral Security - QuizGeneral Security - QuizGeneral Security - QuizGeneral Security - Quiz
Physical Security
11 lectures47:29Physical Security OverviewPhysical Security ConceptsSingle User Mode SecuritySingle User Mode and Blank PasswordsSecuring the Boot LoaderDisk EncryptionEncrypting a New Device, Part IEncrypting a New Device, Part IIEncrypting an Existing DeviceDisabling Control Alt DeletePhysical Security SummaryPhysical Security - Quiz
Physical Security
11 lectures47:29Physical Security OverviewPhysical Security ConceptsSingle User Mode SecuritySingle User Mode and Blank PasswordsSecuring the Boot LoaderDisk EncryptionEncrypting a New Device, Part IEncrypting a New Device, Part IIEncrypting an Existing DeviceDisabling Control Alt DeletePhysical Security SummaryPhysical Security - QuizPhysical Security OverviewPhysical Security OverviewPhysical Security OverviewPhysical Security OverviewPhysical Security ConceptsPhysical Security ConceptsPhysical Security ConceptsPhysical Security ConceptsSingle User Mode SecuritySingle User Mode SecuritySingle User Mode SecuritySingle User Mode SecuritySingle User Mode and Blank PasswordsSingle User Mode and Blank PasswordsSingle User Mode and Blank PasswordsSingle User Mode and Blank PasswordsSecuring the Boot LoaderSecuring the Boot LoaderSecuring the Boot LoaderSecuring the Boot LoaderDisk EncryptionDisk EncryptionDisk EncryptionDisk EncryptionEncrypting a New Device, Part IEncrypting a New Device, Part IEncrypting a New Device, Part IEncrypting a New Device, Part IEncrypting a New Device, Part IIEncrypting a New Device, Part IIEncrypting a New Device, Part IIEncrypting a New Device, Part IIEncrypting an Existing DeviceEncrypting an Existing DeviceEncrypting an Existing DeviceEncrypting an Existing DeviceDisabling Control Alt DeleteDisabling Control Alt DeleteDisabling Control Alt DeleteDisabling Control Alt DeletePhysical Security SummaryPhysical Security SummaryPhysical Security SummaryPhysical Security SummaryPhysical Security - QuizPhysical Security - QuizPhysical Security - QuizPhysical Security - Quiz
Account Security
9 lectures39:49Account Security OverviewIntro to PAMPAM Configuration ExamplePassword SecurityAccount Security Demo #1 (UID 0)Controlling Account AccessSecurity by Account TypeAccount Security Demo #2Account Security Demo #3 (Sudo)Account Security - Quiz
Account Security File System Security OverviewFile and Directory Permissions, IntroFile and Directory Permissions, Part IFile and Directory Permissions, Part IISpecial Modes, Part I This lesson covers the special modes of setuid, setgid, and the sticky bit.Special Modes, Part II This lesson covers the special modes of setuid, setgid, and the sticky bit.File AttributesFile Attributes DemoACLsACLs DemoRootkitsRootkit Hunter DemonstrationFile System Security OverviewFile System Security OverviewFile System Security Overview...
Additional information
A basic understanding of the Linux operating system. Please consider taking "Learn Linux in 5 Days" before taking this course