Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Guide to Linux Security
Chapter 1: Introduction
1. Complete Guide to Linux Secuirty - Intro (1:30)
2. Linux Security - Course overview (4:27)
2: Lab Setup
1-Download and Install VirtualBox (6:05)
2-Creating First Virtual Machine (5:33)
3-Linux Installation (25:05)
4-Linux CentOS8 Installation (24:33)
Chapter 2: Linux Security
3. What is Security and OS Hardening (4:07)
4. Securing All OS (3:11)
5. Importance of Linux Security (6:20)
6. Type of Security Breach (4:19)
7. Change Password Parameters (8:25)
8. Creating User Account and Changing Password (8:47)
9. Set Password Policy (12:21)
10. Disable SSH Access for a Specific User (5:31)
11. Lock or Disable User Accounts Manually (7:06)
12. Lock or Disable User Accounts (7:28)
13. Lock User Account After 3 Failed Attempts (9:08)
14. Restrict Direct “root” Login (7:49)
15. Linux File Ownership and Permissions (4:01)
16. Change File Permissions - LAB (11:55)
17. Change File Ownership - LAB (12:26)
19. Change SSH Port (8:54)
20. Message of the Day (motd) (7:30)
21. One Service Per Server (4:41)
1. Complete Guide to Linux Secuirty - Intro
Download
Complete and Continue
Become a Member and Get
Unlimited Access
to 30,000+ Top Cyber Security Courses And Labs.
UPGRADE NOW