Companies Home Search Profile

Linux Security and Hardening, The Practical Security Guide.

Focused View

Jason Cannon

4:15:12

42 View
  • 001 Course Overview.mp4
    01:25
  • 002 Course Downloads.html
  • 002 linux-security-course-downloads.zip
  • external-links.txt
  • 001 Section Overview.mp4
    01:10
  • 002 Is Linux Secure.mp4
    02:26
  • 003 What Makes Linux Secure.mp4
    08:18
  • 004 Security Guidelines and Principles.mp4
    07:41
  • 005 Section Summary.mp4
    01:36
  • 001 Section Overview.mp4
    00:58
  • 002 Physical Security Concepts.mp4
    07:41
  • 003 Single User Mode Security.mp4
    06:45
  • 004 Single User Mode and Blank Passwords.mp4
    03:13
  • 005 Securing the Boot Loader.mp4
    07:01
  • 006 Disk Encryption.mp4
    05:34
  • 007 Encrypting a New Device, Part I.mp4
    08:38
  • 008 Encrypting a New Device, Part II.mp4
    04:17
  • 009 Encrypting an Existing Device.mp4
    00:52
  • 010 Disabling Control Alt Delete.mp4
    01:44
  • 011 Section Summary.mp4
    00:42
  • 001 Section Overview.mp4
    00:45
  • 002 Intro to PAM.mp4
    05:13
  • 003 PAM Configuration Example.mp4
    04:05
  • 004 Password Security.mp4
    07:58
  • 005 Account Security Demo #1 (UID 0).mp4
    03:11
  • 006 Controlling Account Access.mp4
    05:06
  • 007 Security by Account Type.mp4
    06:02
  • 008 Account Security Demo #2.mp4
    02:44
  • 009 Account Security Demo #3 (Sudo).mp4
    04:43
  • 001 Section Overview.mp4
    00:35
  • 002 Network Security, Part I.mp4
    07:54
  • 003 Network Security, Part II.mp4
    06:20
  • 004 Securing SSHD, Part I.mp4
    07:52
  • 005 Securing SSHD, Part II.mp4
    03:15
  • 006 Linux Firewall Fundamentals.mp4
    07:36
  • 007 Configuring the Firewall from the Command Line.mp4
    04:04
  • 008 Firewall Rule Specifications.mp4
    04:43
  • 009 Example Firewall Rules.mp4
    03:59
  • 010 Linux Firewall Demonstration.mp4
    09:47
  • 011 TCP Wrappers, Part I.mp4
    07:02
  • 012 TCP Wrappers, Part II.mp4
    04:02
  • 001 Section Overview.mp4
    01:02
  • 002 File and Directory Permissions, Intro.mp4
    00:32
  • 003 File and Directory Permissions, Part I.mp4
    11:14
  • 004 File and Directory Permissions, Part II.mp4
    09:18
  • 005 Special Modes, Part I.mp4
    07:56
  • 006 Special Modes, Part II.mp4
    03:04
  • 007 File Attributes.mp4
    06:06
  • 008 File Attributes Demo.mp4
    02:48
  • 009 ACLs.mp4
    09:25
  • 010 ACLs Demo.mp4
    06:13
  • 011 Rootkits.mp4
    08:33
  • 012 Rootkit Hunter Demonstration.mp4
    07:12
  • 013 Rootkit Detection Software.html
  • 001 Additional Security Resources.mp4
    04:52
  • 002 LinuxHardeningGuides.pdf
  • 003 LinuxSecurityEmailLists.pdf
  • 004 CitySecMeetups.pdf
  • 005 SecurityConferenceVideos.pdf
  • 001 Bonus Lecture.html
  • Description


    Secure any Linux server from hackers & protect it against hacking. The practical Linux Administration security guide.

    What You'll Learn?


    • By the end of this course you will be able to harden a Linux system, reduce its surface of vulnerability, and reduce the risk of your Linux system being hacked or compromised.

    Who is this for?


  • Anyone with a desire to learn how to secure and harden a computer running the Linux operating system.
  • Linux system administrators looking to make the systems they support more secure.
  • People thinking about a career as a Linux system administrator or engineer.
  • This course is not for people who have never used the Linux operating system before.
  • What You Need to Know?


  • A basic understanding of the Linux operating system. Please consider taking "Learn Linux in 5 Days" before taking this course.
  • More details


    Description

    JOIN THE OTHER 40,000 SUCCESSFUL STUDENTS WHO HAVE ALREADY MASTERED THE LINUX OPERATING SYSTEM WITH ONE OF MY TOP RATED COURSES!

    Keep yourself and your company out of the news by protecting your Linux systems from hackers, crackers, and attackers!

    This course will not only teach you the security concepts and guidelines that will keep your Linux servers safe, it will walk you through hardening measures step-by-step.

    Hello. My name is Jason Cannon and I'm the author of Linux Administration, the founder of the Linux Training Academy, and an instructor to thousands of satisfied students. I started my IT career in the late 1990's as a Unix and Linux System Engineer. I've worked for many technology companies who take information security seriously. I've even worked for security firms such as Mandiant and FireEye. I'll be sharing my real-world Linux security experience with you throughout this course.

    By the end of this course you will be able to tighten up the security on any Linux system. You'll learn the security weaknesses of the Linux operating system and be given step-by-step instructions on how to protect those weaknesses. You'll even learn some security concepts that apply to information security as a whole while focusing on the Linux specific issues that require special consideration.

    What People Are Saying About Jason and his Courses:

    "Excellent course on Linux! It is the best way to get started using Linux that I have come across." --Chris Bischoff, Udemy student

    "This class was a great review of the 2 Linux classes I took in school. I learned plenty of new stuff and got a great refresher on things I haven't used in some time. I did well on my interview and got the job I was looking for. Thanks!" --Alan Derrick, Udemy student

    "This was a great course! Learned a lot from it!" --Ricardo José Crosara Junior, Udemy student

    "Excellent starter course. Very good and complete guide to get you started on working on Linux." --Brian Mulder, Udemy student

    "Great course! Easy to understand for beginners and a great refresher for experienced users!" --Spencer Ball, Udemy student

    "Very well laid out course. Thanks Jason!" --Eric Etheredge, Udemy student

    "Love it... it's absolutely one of the best courses I've taken here on Udemy." --Idriss N, Udemy student

    "Awesome Course! Another great one. Thanks Jason!" --John Wilmont, Udemy student

    "Excellent Course! Having come from a moderate understanding of Linux, this course has given me a deeper and more streamlined understanding of Linux. Definitely worth the money." --Armando Cabrera, Udemy student

    "Fantastic course and very beautifully explained." --S John, Udemy student

    "Great course, great instructor. I enjoyed every minute of it. I recommend this course 100%." --Alfredo, Udemy student

    "I am lovin' it. Nice way to begin one's journey into Linux." --Rohit Gupta, Udemy student

    ____________________

    Here is just some of what you will learn by taking this Linux Security and Hardening course:

    • How to protect your Linux systems against hackers.
    • Ways to prevent attackers from breaking into your systems, even when they have physical access to your machine.
    • How to enforce strong password policies and control password as well as account aging policies on your Linux servers.
    • SSH Hardening practices.
    • Network security tactics.
    • Port scanning and network service detection.
    • How the Linux firewall works and exactly how to configure it.
    • How to protect the superuser (root) account.
    • Ways to share accounts securely with an audit trail.
    • File system security and encryption.
    • Using and configuring sudo, and why you need to.
    • Advanced Linux permissions include special modes, file attributes, and access control lists (ACLs).
    • Much, much more!
    • Unconditional Udemy 30 day money-back guarantee - that's my personal promise of your success!

    What you learn in course applies to any Linux environment or distribution including Ubuntu, Debian, Linux Mint, RedHat, CentOS, Fedora, OpenSUSE, Slackware, Kali Linux and more.

    ____________________

    Free Bonus - PDFs of All the Material Covered

    As an added bonus for enrolling in this Linux Server Security video training course, you'll receive access to all the slides used in the lessons. You can download them and refer to them when you want to jog your memory or double-check your work.

    Enroll now and start learning the skills you need to hack-proof your Linux systems today!

    Who this course is for:

    • Anyone with a desire to learn how to secure and harden a computer running the Linux operating system.
    • Linux system administrators looking to make the systems they support more secure.
    • People thinking about a career as a Linux system administrator or engineer.
    • This course is not for people who have never used the Linux operating system before.

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Jason Cannon
    Jason Cannon
    Instructor's Courses
    Jason started his career as a Unix and Linux System Engineer in 1999. Since then, he has utilized his Linux skills at companies such as Xerox, UPS, Hewlett-Packard, and Amazon. Additionally, he has acted as a technical consultant and independent contractor for small businesses and Fortune 500 companies. Jason has professional experience with RedHat Enterprise Linux, CentOS, Ubuntu, and SUSE Linux Enterprise Server. He has used several Linux distributions on personal projects, including Debian, Slackware, Arch Linux, CrunchBang, Raspberry Pi OS, and others. In addition to Linux, Jason has experience supporting proprietary Unix operating systems, including AIX, HP-UX, and Solaris. He enjoys teaching others how to use and exploit the power of the Linux operating system. He is also the author of the books "Linux for Beginners," "Command Line Kung Fu," and "Docker: A Project-Based Approach to Learning."
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 51
    • duration 4:15:12
    • English subtitles has
    • Release Date 2023/11/15