Oreilly - Mastering Linux Security and Hardening - 9781789340884
Oreilly - Mastering Linux Security and Hardening
by Donald A. Tevault | Publisher: Packt Publishing | Release Date: April 2018 | ISBN: 9781789340884


A comprehensive guide to mastering the art of preventing your Linux system from getting compromised.About This VideoLeverage this guide to confidently deliver a system that reduces the risk of being hackedPerform a number of advanced Linux security techniques such as network service detection, user authentication, controlling special permissions, encrypting file systems, and much moreMaster the art of securing a Linux environment with this end-to-end practical guideIn DetailThis course has extensive coverage of techniques that will help prevent attackers from breaching your system, by building a much more secure Linux environment. You will learn various security techniques such as SSH hardening, network service detection, setting up firewalls, encrypting file systems, protecting user accounts, authentication processes, and so on. Moving forward, you will also develop hands-on skills with advanced Linux permissions, access control, special modes, and more. Lastly, this course will also cover best practices and troubleshooting techniques to get your work done efficiently. By the end of this course, you will be confident in delivering a system that will be much harder to compromise..
  1. Chapter 1 : Running Linux in a Virtual Environment
    • The Course Overview 00:05:09
    • The Threat Landscape and Keeping Up with Security News 00:04:20
    • Introduction to VirtualBox and Cygwin 00:14:01
  2. Chapter 2 : Securing User Accounts
    • Setting Up sudo Privileges for Full Administrative Users 00:05:40
    • Setting Up sudo for Users with Only Certain Delegated Privileges 00:03:13
    • Advanced Tips and Tricks for Using sudo 00:03:21
    • Locking Down Users' Home Directories the Red Hat/CentOS and Debian/Ubuntu Way 00:04:35
    • Enforcing Strong Password Criteria 00:04:58
    • Setting and Enforcing Password and Account Expiration 00:10:43
    • Preventing Brute-Force Password Attacks 00:06:11
    • Locking User Accounts 00:05:17
  3. Chapter 3 : Securing Your Server with a Firewall
    • An Overview of iptables 00:11:10
    • Uncomplicated Firewall for Ubuntu Systems 00:03:19
    • firewalld for Red Hat Systems 00:12:14
    • nftables – A More Universal Type of Firewall System 00:13:32
  4. Chapter 4 : Encrypting and SSH Hardening
    • GNU Privacy Guard 00:08:27
    • Encrypting Partitions with Linux Unified Key Setup – LUKS 00:02:14
    • Encrypting Directories with eCryptfs 00:04:48
    • Using VeraCrypt for Cross-Platform Sharing of Encrypted Containers 00:04:15
    • Ensuring that SSH Protocol 1 Is Disabled 00:01:24
    • Creating a User’s SSH Key Set 00:02:13
    • Disabling Username/Password Logins 00:02:33
  5. Chapter 5 : Mastering Discretionary Access Control
    • Changing Ownership of Files and Directories 00:03:30
    • Setting Permissions Values 00:03:59
    • Using SUID and SGID 00:04:51
    • Protecting Sensitive Files 00:05:08
  6. Chapter 6 : Access Control Lists and Shared Directory Management
    • Creating an Access Control List 00:03:27
    • Creating an Inherited Access Control List 00:02:31
    • Removing a Specific Permission 00:01:48
    • Preventing Loss of ACLs 00:03:50
    • Creating a User Group and Adding Members to It 00:05:12
    • Setting the SGID Bit and the Sticky Bit 00:03:46
    • Accessing Files in the Shared Directory 00:03:07
  7. Chapter 7 : Implementing Mandatory Access Control with SELinux and AppArmor
    • How SELinux Can Benefit a Systems Administrator? 00:04:02
    • Setting Security Contexts for Files and Directories 00:11:56
    • Troubleshooting with setroubleshoot 00:04:15
    • Working with SELinux Policies 00:09:39
    • Looking at AppArmor Profiles 00:02:24
    • Working with AppArmor Command-Line Utilities 00:04:26
  8. Chapter 8 : Scanning, Auditing, and Hardening
    • Installing and Updating ClamAV and maldet 00:06:34
    • Scanning with ClamAV and maldet 00:01:50
    • SELinux Considerations 00:01:23
    • Scanning for Rootkits with Rootkit Hunter 00:04:24
    • Controlling the auditd Daemon and Creating Audit Rule 00:08:36
    • Using ausearch and aureport 00:07:30
    • Scanning and Hardening with Lynis 00:04:08
  9. Oreilly - Mastering Linux Security and Hardening


 TO MAC USERS: If RAR password doesn't work, use this archive program: 

RAR Expander 0.8.5 Beta 4  and extract password protected files without error.


 TO WIN USERS: If RAR password doesn't work, use this archive program: 

Latest Winrar  and extract password protected files without error.


 Coktum   |  

Information
Members of Guests cannot leave comments.


SermonBox - Seasonal Collection

SermonBox - The Series Pack Collection

Top Rated News

  • Christmas Material
  • Laser Cut & Print Design Elements Bundle - ETSY
  • Daz3D - All Materials - SKU 37000-37999
  • Cgaxis - All Product - 2019 - All Retail! - UPDATED!!!
  • DigitalXModels Full Collections
  • Rampant Design Tools Full Collections Total: $4400
  • FilmLooks.Com Full Collection
  • All PixelSquid Product
  • The Pixel Lab Collection
  • Envato Elements Full Sources- 3200+ Files
  • Ui8.NET Full Sources
  • The History of The 20th Century
  • The Dover Collections
  • Snake Interiors Collections
  • Inspirational Collections
  • Veer Fancy Collections
  • All Ojo Images
  • All ZZVE Collections
  • All Sozaijiten Collections
  • All Image Broker Collections
  • Shuterstock Bundle Collections
  • Tattoo Collections
  • Blend Images Collections
  • Authors Tuorism Collections
  • Motion Mile - Big Bundle
  • PhotoBacks - All Product - 2018
  • Dekes Techniques - Photoshop & Illustrator Course - 1 to 673
Telegram GFXTRA Group
Udemy - Turkce Gorsel Ogrenme Setleri - Part 2
Videohive Wow Pack Series


rss