Companies Home Search Profile

Linux Security - Basics and Beyond

Focused View

11:30:59

107 View
  • 1.1 Introduction to Linux Users.mp4
    03:09
  • 1.2 Principle of Least Priilege.mp4
    04:58
  • 1.3 Accessing the Repository and Network Map.mp4
    03:54
  • 1.4 The id Command.mp4
    07:03
  • 2.1 Secure Passwords.mp4
    03:30
  • 2.2 Setting the Password.mp4
    06:13
  • 2.3 Generating Passwords with openssl and KeePass.mp4
    12:23
  • 2.4 The passwd and shadow Files.mp4
    08:11
  • 2.5 Password Settings.mp4
    10:02
  • 2.6 Password Policy Configuration.mp4
    11:54
  • 3.1 Logging in as a Typical User by Password.mp4
    14:23
  • 3.2 Logging in as an Enterprise User.mp4
    14:29
  • 3.3 Locking the System.mp4
    04:35
  • 3.4 SSH Basics.mp4
    09:23
  • 3.5 SSH and Linux in the Cloud.mp4
    17:17
  • 4.1 The su command.mp4
    06:37
  • 4.2 Using the sudo command.mp4
    08:57
  • 4.3 sudoers.mp4
    07:03
  • 4.4 Assigning a Regular User sudo Permissions.mp4
    07:11
  • 5.1 Introduction to Linux OS Security.mp4
    02:36
  • 5.2 Defense in Depth.mp4
    03:27
  • 5.3 The CIA Triad.mp4
    03:07
  • 6.1 Updating Debian and Ubuntu.mp4
    12:08
  • 6.2 More apt and Repositories.mp4
    10:25
  • 6.3 Updating Fedora, Red Hat, and CentOS.mp4
    03:39
  • 6.4 Installing Security Updates Only.mp4
    10:44
  • 6.5 Updating SUSE.mp4
    03:13
  • 6.6 Updating Arch.mp4
    03:20
  • 7.1 systemctl Basics.mp4
    03:00
  • 7.2 Reducing the Attack Surface.mp4
    14:06
  • 7.3 Creating a Degraded System.mp4
    05:09
  • 7.4 Repairing a Degraded System.mp4
    08:35
  • 7.5 systemd states.mp4
    05:57
  • 8.1 10 Steps to a Secure Linux Serer (Part I).mp4
    06:40
  • 8.2 10 Steps to a Secure Linux Serer Serer (Part II).mp4
    04:42
  • 8.3 Wired & Wireless Security in Linux.mp4
    13:00
  • 8.4 Securing GRUB.mp4
    13:24
  • 9.1 AppArmor Basics.mp4
    08:02
  • 9.2 AppArmor Profiles.mp4
    15:15
  • 9.3 AppArmor and Apache Example.mp4
    10:48
  • 9.4 SELinux Basics.mp4
    12:17
  • 10.1 What is a Firewall.mp4
    02:55
  • 10.2 Types of Linux-based Firewalls.mp4
    02:10
  • 10.3 Zero-Trust Enironment Mindset.mp4
    03:03
  • 11.1 UFW Introduction.mp4
    02:02
  • 11.2 Setting up UFW.mp4
    06:11
  • 11.3 Configuring UFW.mp4
    10:21
  • 12.1 firewalld Introduction.mp4
    02:22
  • 12.2 Installing and enabling firewalld.mp4
    06:50
  • 12.3 Configuring and Testing firewalld.mp4
    14:56
  • 12.4 Lock it Down!.mp4
    02:32
  • 12.5 Returning the System to its Original State.mp4
    02:06
  • 13.1 Introduction to nftables and the nft command.mp4
    02:34
  • 13.2 nftables Setup.mp4
    04:05
  • 13.3 Tables Chains Rules.mp4
    02:31
  • 13.4 Building the nftables Configuration (Part I).mp4
    08:41
  • 13.5 Building the nftables Configuration (Part II).mp4
    08:39
  • 13.6 Saing and Restoring the nftables Configurations.mp4
    08:36
  • 13.7 Translating iptables to nftables.mp4
    07:49
  • 14.1 Reiew of SSH.mp4
    01:47
  • 14.2 Using Keys to connect ia SSH.mp4
    12:57
  • 14.3 The sshd config file.mp4
    03:19
  • 14.4 Modifying the default SSH port.mp4
    07:32
  • 14.5 Disabling Password-based SSH.mp4
    02:57
  • 14.6 Disabling root login ia SSH.mp4
    02:33
  • 14.7 Exclusie SSH Groups.mp4
    04:37
  • 14.8 Authentication Settings.mp4
    10:06
  • 14.9 Terminating SSH Connections (Part I).mp4
    07:45
  • 14.10 Terminating SSH Connections (Part II).mp4
    06:53
  • 15.1 RAID 1.mp4
    05:32
  • 15.2 RAID 5.mp4
    05:16
  • 15.3 RAID 10 and ZFS.mp4
    11:36
  • 15.4 Backup!.mp4
    10:12
  • 16.1 chmod.mp4
    12:09
  • 16.2 chown and chgrp.mp4
    14:46
  • 16.3 Encryption in Linux.mp4
    08:34
  • 16.4 Linux Encoding and Hashing.mp4
    13:18
  • 17.1 Viewing Processes.mp4
    09:49
  • 17.2 Ending Processes with Commands.mp4
    05:36
  • 17.3 Ending Processes with top.mp4
    06:44
  • 18.1 Logging in Linux - The Journal.mp4
    10:52
  • 18.2 Logging in Linux - rsyslog Part I.mp4
    10:08
  • 18.3 Logging in Linux - rsyslog Part II.mp4
    08:22
  • 18.4 Auditing in Linux.mp4
    10:21
  • 18.5 Nmap.mp4
    08:57
  • 18.6 Wireshark.mp4
    12:55
  • 18.7 Additional Tools.mp4
    03:06
  • Learning objecties.mp4
    00:58
  • Learning objecties (1).mp4
    00:58
  • Learning objecties (2).mp4
    00:41
  • Learning objecties (3).mp4
    00:54
  • Learning objecties (4).mp4
    01:09
  • Learning objecties (5).mp4
    00:25
  • Learning objecties (6).mp4
    01:59
  • Learning objecties (7).mp4
    01:34
  • Learning objecties (8).mp4
    00:41
  • Learning objecties (9).mp4
    00:38
  • Learning objecties (10).mp4
    00:46
  • Learning objecties (11).mp4
    00:22
  • Learning objecties (12).mp4
    00:50
  • Learning objecties (13).mp4
    01:34
  • Learning objecties (14).mp4
    01:18
  • Learning objecties (15).mp4
    01:30
  • Learning objecties (16).mp4
    00:34
  • Learning objecties (17).mp4
    00:25
  • Learning objecties (18).mp4
    00:57
  • Linux Security - Basics and Beyond Introduction.mp4
    03:03
  • Linux Security - Basics and Beyond Summary.mp4
    01:23
  • Module Introduction.mp4
    00:46
  • Module Introduction (1).mp4
    01:37
  • Module Introduction (2).mp4
    02:21
  • Module Introduction (3).mp4
    01:48
  • More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Pearson's video training library is an indispensable learning tool for today's competitive job market. Having essential technology training and certifications can open doors for career advancement and life enrichment. We take learning personally. We've published hundreds of up-to-date videos on wide variety of key topics for Professionals and IT Certification candidates. Now you can learn from renowned industry experts from anywhere in the world, without leaving home.
    • language english
    • Training sessions 112
    • duration 11:30:59
    • Release Date 2024/07/21

    Courses related to Network Security

    Courses related to Linux

    BPF Edition
    LinuxCBTBPF Edition
    7:45:13
    06/28/2023
    Subtitle
    Practical Linux for Pentesting & Bug Bounties

    Courses related to Linux Administration