Companies Home Search Profile

Linux Hardening

Focused View

Cybrary

2:50:47

35 View
  • 01 - Course overview.mp4
    04:50
  • 01 - Why we harden.mp4
    03:52
  • 02 - Hardening-in-depth as a concept.mp4
    05:27
  • 03 - The CIS benchmarks.mp4
    01:41
  • 04 - Hardening the foundation.mp4
    02:23
  • 05 - Hardening storage devices.mp4
    04:44
  • 06 - Firewalls and IPSIDS as endpoint security.mp4
    04:35
  • 07 - Managing services.mp4
    05:17
  • 08 - Lifecycle management.mp4
    04:07
  • 09 - Recommendations for integrating hardening measures.mp4
    04:56
  • 01 - Hardening the hardware.mp4
    02:22
  • 02 - Hardening the bootloader.mp4
    04:24
  • 03 - Securing the kernel.mp4
    09:00
  • 04 - Disabling Ctrl-Alt-Delete (demo).mp4
    01:06
  • 05 - Securing storage devices, part one.mp4
    09:03
  • 06 - Securing storage devices, part two.mp4
    07:35
  • 07 - Disabling SUID and SGID permissions (demo).mp4
    00:51
  • 08 - Blocking unwanted activities and traffic.mp4
    07:52
  • 09 - Minimizing the OS attack surface, part one.mp4
    05:36
  • 10 - Minimizing the OS attack surface, part two.mp4
    04:41
  • 11 - Network hardening at the host.mp4
    04:54
  • 12 - System administration hardening.mp4
    06:08
  • 13 - Testing, monitoring, and reviewing.mp4
    09:25
  • 01 - General handling of services, part one.mp4
    04:22
  • 02 - General handling of services, part two.mp4
    05:30
  • 03 - Hardening public-facing services.mp4
    04:01
  • 04 - Hardening the secure shell (SSH) service, part one.mp4
    05:49
  • 05 - Limiting logins through SSH (demo).mp4
    03:52
  • 06 - Hardening the secure shell (SSH) service, part two.mp4
    02:14
  • 01 - User password authentication requirements.mp4
    06:46
  • 02 - Alternate user authentication requirements.mp4
    03:12
  • 03 - Creating and implementing a key pair for login (demo).mp4
    04:08
  • 04 - Account management requirements.mp4
    03:28
  • 05 - Reviewing accounts.mp4
    06:28
  • 01 - Linux hardening course review.mp4
    02:39
  • 02 - Linux hardening Whats next.mp4
    03:29
  • Description


    Are you a Linux systems administrator seeking to learn the best practices for securing your network? New threats are emerging every day, and as an administrator, you need to stay ahead of threats. In this course, Corey Holzer takes you through hardening for the system level, services, and user account management.

    Note: This course was created by Cybrary. We are pleased to host this training in our library.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    LinkedIn Learning is an American online learning provider. It provides video courses taught by industry experts in software, creative, and business skills. It is a subsidiary of LinkedIn. All the courses on LinkedIn fall into four categories: Business, Creative, Technology and Certifications. It was founded in 1995 by Lynda Weinman as Lynda.com before being acquired by LinkedIn in 2015. Microsoft acquired LinkedIn in December 2016.
    • language english
    • Training sessions 36
    • duration 2:50:47
    • English subtitles has
    • Release Date 2024/08/12