Oreilly - Linux Security and Hardening, The Practical Security Guide
by Linux Training Academy, Jason Cannon | Publisher: Packt Publishing | Release Date: October 2018 | ISBN: 9781789612820
Secure any Linux server from hackers and protect it against hacking. The practical Linux Administration security guide.About This VideoYou will be able to harden a Linux system, reduce its surface of vulnerability, and reduce the risk of your Linux system being hacked or compromised.In DetailKeep yourself and your company out of the news by protecting your Linux systems from hackers, crackers, and attackers! This course will not only teach you the security concepts and guidelines that will keep your Linux servers safe, it will walk you through hardening measures step-by-step. By the end of this course, you will be able to tighten up the security on any Linux system. You'll learn the security weaknesses of the Linux operating system and will be given step-by-step instructions on how to protect those weaknesses. You'll even learn some security concepts that apply to information security as a whole while focusing on Linux-specific issues that require special consideration. What you learn in this course applies to any Linux environment or distribution including Ubuntu, Debian, Linux Mint, RedHat, CentOS, Fedora, OpenSUSE, Slackware, Kali Linux, and more.
- Chapter 1 : Course Overview and Downloads
- Chapter 2 : General Security
- Section Overview 00:01:10
- Is Linux Secure? 00:02:27
- What Makes Linux Secure? 00:08:19
- Security Guidelines and Principles 00:07:41
- Section Summary 00:01:36
- Chapter 3 : Physical Security
- Section Overview 00:00:58
- Physical Security Concepts 00:07:41
- Single User Mode Security 00:06:46
- Single User Mode and Blank Passwords 00:03:13
- Securing the Boot Loader 00:07:02
- Disk Encryption 00:05:35
- Encrypting a New Device, Part I 00:08:38
- Encrypting a New Device, Part II 00:04:17
- Encrypting an Existing Device 00:00:52
- Disabling Control Alt Delete 00:01:45
- Section Summary 00:00:43
- Chapter 4 : Account Security
- Section Overview 00:00:46
- Intro to PAM 00:05:14
- PAM Configuration Example 00:04:05
- Password Security 00:07:58
- Account Security Demo #1 (UID 0) 00:03:11
- Controlling Account Access 00:05:07
- Security by Account Type 00:06:02
- Account Security Demo #2 00:02:44
- Account Security Demo #3 (Sudo) 00:04:43
- Chapter 5 : Network Security
- Section Overview 00:00:35
- Network Security, Part I 00:07:55
- Network Security, Part II 00:06:21
- Securing SSHD, Part I 00:07:52
- Securing SSHD, Part II 00:03:16
- Linux Firewall Fundamentals 00:07:37
- Configuring the Firewall from the Command Line 00:04:04
- Firewall Rule Specifications 00:04:44
- Example Firewall Rules 00:04:00
- Linux Firewall Demonstration 00:09:48
- TCP Wrappers, Part I 00:07:03
- TCP Wrappers, Part II 00:04:02
- Chapter 6 : File System Security
- Section Overview 00:01:03
- File and Directory Permissions, Intro 00:00:32
- File and Directory Permissions, Part I 00:11:14
- File and Directory Permissions, Part II 00:09:28
- Special Modes, Part I 00:07:56
- Special Modes, Part II 00:03:05
- File Attributes 00:06:06
- File Attributes Demo 00:02:48
- ACLs 00:09:25
- ACLs Demo 00:06:14
- Rootkits 00:08:34
- Rootkit Hunter Demonstration 00:07:12
- Chapter 7 : Additional Security Resources
- Additional Security Resources 00:04:52