Stone River Elearning – Linux Security and HardeningThe Linux Security course explores the various tools and techniques commonly used by Linux system administrators and end users to complete their day-to-day tasks in a Linux environment. It is designed for experienced computer users who have limited previous exposure to Linux, whether they are working in an individual or a corporate environment.The Linux Security course is an essential course for experienced Linux professionals who are looking to become expert administrators and be able to harden the Linux infrastructure that they have deployed. The course builds on the basic concepts of Linux and covers the more advanced security topics essential to make the systems more secure. The course covers the core security topics of the operating system and focuses on the standardized techniques that can be applied to all of the Linux Operating System’s environments such as Ubuntu, CentOS, Debian, Kali, RedHat and Fedora etc.The course is designed for experienced candidates. Prior knowledge of the basics of Linux Operating system is required to fully comprehend the contents of this course.The course is intended for:Candidates looking to learn the Linux Command Line InterfaceExisting Linux users who want to become power usersCandidates working on Linux-based projectsLinux support staffLinux system administratorsCourse CurriculumCourse Overview and DownloadsCourse Overview (1:25)Course DownloadsGeneral SecuritySection Overview – General Security (1:09)Is Linux Secure? (2:26)What Makes Linux Secure? (8:18)Security Guidelines and Principles (7:41)Section Summary – General Security (1:36)Physical SecuritySection Overview – Physical Security (0:58)Physical Security Concepts (7:41)Single User Mode Security (6:45)Single User Mode and Blank Passwords (3:13)Securing the Boot Loader (7:01)Disk Encryption (5:34)Encrypting a New Device, Part I (8:38)Encrypting a New Device, Part II (4:17)Encrypting an Existing Device (0:52)Disabling Control Alt Delete (1:44)Section Summary – Physical Security (0:42)Account SecuritySection Overview – Account Security (0:45)Intro to PAM (5:13)PAM Configuration Example (4:04)Password Security (7:58)Account Security Demo #1 (UID 0) (3:11)Controlling Account Access (5:06)Security by Account Type (6:01)Account Security Demo #2 (2:44)Account Security Demo #3 (4:43)Network SecuritySection Overview – Network Security (0:35)Network Security, Part I (7:54)Network Security, Part II (6:20)Securing SSHD, Part I (7:52)Securing SSHD, Part II (3:15)Linux Firewall Fundamentals (7:36)Configuring the Firewall from the Command Line (4:03)Firewall Rule Specifications (4:43)Example Firewall Rules (3:59)Linux Firewall Demonstration (9:47)TCP Wrappers, Part I (7:02)TCP Wrappers, Part I| (4:02)File System SecuritySection Overview – File System Security (1:02)File and Directory Permissions (0:32)File and Directory Permissions, Part I (11:14)File and Directory Permissions, Part II (9:28)Special Modes, Part I (7:56)Special Modes, Part II (3:04)File Attributes (6:05)File Attributes Demo (2:48)ACLs (9:25)ACLs Demo (6:13)Rootkits (8:33)Rootkit Hunter Demonstration (7:12)Additional Security ResourcesAdditional Security Resources (4:52)There are no reviews yet.Add a Review Cancel replyYou must be logged in to post a review.
Stone River Elearning – Microsoft 70-246 Monitoring and Operating a Private Cloud with System
₹6,474.00
Stone River Elearning – Learn Pascal Programming from Scratch
₹4,814.00
Stone River Elearning – Linux Security and Hardening
₹3,652.00