fbpx
4.38 out of 5
4.38
1773 reviews on Udemy

Linux Security – The Practical Security Guide

Secure any Linux server from hackers & protect it against hacking. The practical Linux Administration security guide.
Instructor:
Jason Cannon
19,115 students enrolled
English
By the end of this course you will be able to harden a Linux system, reduce its surface of vulnerability, and reduce the risk of your Linux system being hacked or compromised.

This course will not only teach you the security concepts and guidelines that will keep your Linux servers safe, it will walk you through hardening measures step-by-step.

My name is Jason Cannon and I’m the author of Linux Administration, the founder of the Linux Training Academy, and an instructor to thousands of satisfied students. I started my IT career in the late 1990’s as a Unix and Linux System Engineer. I’ve worked for many technology companies who take information security seriously. I’ve even worked for security firms such as Mandiant and FireEye. I’ll be sharing my real-world Linux security experience with you throughout this course.

By the end of this course you will be able to tighten up the security on any Linux system. You’ll learn the security weaknesses of the Linux operating system and be given step-by-step instructions on how to protect those weaknesses. You’ll even learn some security concepts that apply to information security as a whole while focusing on the Linux specific issues that require special consideration.

Here is some of what you will learn by taking this Linux Security and Hardening course:

 

  • How to protect your Linux systems against hackers.
  • Ways to prevent attackers from breaking into your systems, even when they have physical access to your machine.
  • How to enforce strong password policies and control password as well as account aging policies on your Linux servers.
  • SSH Hardening practices.
  • Network security tactics.
  • Port scanning and network service detection.
  • How the Linux firewall works and exactly how to configure it.
  • How to protect the superuser (root) account.
  • Ways to share accounts securely with an audit trail.
  • File system security and encryption.
  • Using and configuring sudo, and why you need to.
  • Advanced Linux permissions include special modes, file attributes, and access control lists (ACLs).
  • Much, much more!

 

  • What you learn in course applies to any Linux environment or distribution including Ubuntu, Debian, Linux Mint, RedHat, CentOS, Fedora, OpenSUSE, Slackware, Kali Linux and more.

____________________

Free Bonus – PDFs of All the Material Covered

As an added bonus for enrolling in this Linux Server Security video training course, you’ll receive access to all the slides used in the lessons. You can download them and refer to them when you want to jog your memory or double-check your work.

Enroll now and start learning the skills you need to hack-proof your Linux systems today!

Course Overview and Downloads

1
Course Overview

A brief overview of what you'll learn in this Linux security course.

2
Course Downloads

The course download includes the lecture slides as well as additional information security resources.

General Security

1
Section Overview
2
Is Linux Secure?
3
What Makes Linux Secure?
4
Security Guidelines and Principles
5
Section Summary
6
General Security

Physical Security

1
Section Overview
2
Physical Security Concepts
3
Single User Mode Security
4
Single User Mode and Blank Passwords
5
Securing the Boot Loader
6
Disk Encryption
7
Encrypting a New Device, Part I
8
Encrypting a New Device, Part II
9
Encrypting an Existing Device
10
Disabling Control Alt Delete
11
Section Summary
12
Physical Security

Account Security

1
Section Overview
2
Intro to PAM
3
PAM Configuration Example
4
Password Security
5
Account Security Demo #1 (UID 0)
6
Controlling Account Access
7
Security by Account Type
8
Account Security Demo #2
9
Account Security Demo #3 (Sudo)
10
Account Security

Network Security

1
Section Overview
2
Network Security, Part I
3
Network Security, Part II
4
Securing SSHD, Part I
5
Securing SSHD, Part II
6
Linux Firewall Fundamentals
7
Configuring the Firewall from the Command Line
8
Firewall Rule Specifications
9
Example Firewall Rules
10
Linux Firewall Demonstration
11
Linux Firewalls
12
TCP Wrappers, Part I
13
TCP Wrappers, Part II
14
Network Security

File System Security

1
Section Overview
2
File and Directory Permissions, Intro
3
File and Directory Permissions, Part I
4
File and Directory Permissions, Part II
5
Special Modes, Part I

This lesson covers the special modes of setuid, setgid, and the sticky bit.

6
Special Modes, Part II

This lesson covers the special modes of setuid, setgid, and the sticky bit.

7
File Attributes
8
File Attributes Demo
9
ACLs
10
ACLs Demo
11
Rootkits
12
Rootkit Hunter Demonstration
13
Rootkit Detection Software

Additional Security Resources

1
Additional Security Resources
2
Linux Hardening Guides
3
Linux Security Email Lists
4
Security Meetups List
5
Security Conference Videos

Bonus Lecture Section: Get my other courses at the maximum discount!

1
Bonus Lecture: Get my other courses at the maximum discount!
You can view and review the lecture materials indefinitely, like an on-demand channel.
Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don`t have an internet connection, some instructors also let their students download course lectures. That`s up to the instructor though, so make sure you get on their good side!
4.4
4.4 out of 5
1773 Ratings

Detailed Rating

Stars 5
897
Stars 4
656
Stars 3
173
Stars 2
34
Stars 1
13