Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Linux Security and Hardening, The Practical Security Guide
Training Overview
Description of Training
Video Overview (2:32)
Course Overview and Downloads
Course Overview (1:25)
General Security
Section Overview (1:09)
Is Linux Secure? (2:26)
What Makes Linux Secure? (8:18)
Security Guidelines and Principles (7:41)
Section Summary (1:36)
Quiz 1
Physical Security
Section Overview (0:58)
Physical Security Concepts (7:41)
Single User Mode Security (6:45)
Single User Mode and Blank Passwords (3:13)
Securing the Boot Loader (7:01)
Disk Encryption (5:34)
Encrypting a New Device, Part I (8:38)
Encrypting a New Device, Part II (4:17)
Encrypting an Existing Device (0:52)
Disabling Control Alt Delete (1:44)
Section Summary (0:42)
Quiz 2
Account Security
Section Overview (0:45)
Intro to PAM (5:13)
PAM Configuration Example (4:05)
Password Security (7:58)
Account Security Demo #1 (UID 0) (3:11)
Controlling Account Access (5:06)
Security by Account Type (6:02)
Account Security Demo #2 (2:44)
Account Security Demo #3 (Sudo) (4:43)
Quiz 3
Network Security
Section Overview (0:35)
Network Security, Part I (7:54)
Network Security, Part II (6:24)
Securing SSHD, Part I (7:52)
Securing SSHD, Part II (3:15)
Linux Firewall Fundamentals (7:36)
Configuring the Firewall from the Command Line (4:04)
Firewall Rule Specifications (4:43)
Example Firewall Rules (3:59)
Linux Firewall Demonstration (9:47)
Quiz 4
TCP Wrappers, Part I (7:02)
TCP Wrappers, Part II (4:02)
Quiz 5
File System Security
Section Overview (1:02)
File and Directory Permissions, Intro (0:32)
File and Directory Permissions, Part I (11:14)
File and Directory Permissions, Part II (9:18)
Special Modes, Part I (7:56)
Special Modes, Part II (3:04)
File Attributes (6:06)
File Attributes Demo (2:48)
ACLs (9:25)
ACLs Demo (6:13)
Rootkits (8:33)
Rootkit Hunter Demonstration (7:12)
Rootkit Detection Software
Additional Security Resources
Additional Security Resources (4:52)
Linux Hardening Guides
Linux Security Email Lists
Security Meetups List
Security Conference Videos
Audio Version of Training
Audio Download
Audio Download
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock