Linux Security and Hardening, The Practical Security Guide

Jason Cannon

Play Speed
  • 0.5x
  • 1x (Normal)
  • 1.25x
  • 1.5x
  • 2x
51 Videos (4h 3m)
    • Course Overview

      1:25
    • General Security - Section Overview

      1:09
    • Is Linux Secure?

      2:26
    • What Makes Linux Secure?

      8:18
    • Security Principles and Guidelines

      7:41
    • General Security - Section Summary

      1:36
    • Physical Security - Section Summary

      0:58
    • Physical Security Concepts

      7:41
    • Single User Mode Security

      6:45
    • Single User Mode and Blank Passwords

      3:13
    • Securing the Boot Loader

      7:01
    • Disk Encryption

      5:34
    • Encrypting a New Device, Part I

      8:38
    • Encrypting a New Device, Part II

      4:17
    • Encrypting an Existing Device

      0:52
    • Disabling Control Alt Delete

      1:44
    • Physical Security - Section Summary

      0:42
    • Account Security - Section Overview

      0:45
    • Intro to PAM

      5:13
    • PAM Configuration Example

      4:04
    • Password Security

      7:58
    • Account Security Demo I

      3:11
    • Controlling Account Access

      5:06
    • Security by Account Type

      6:01
    • Account Security Demo II

      2:44
    • Account Security Demo III

      4:43
    • Network Security - Section Overview

      0:35
    • Network Security, Part I

      7:54
    • Network Security, Part II

      6:20
    • Securing SSHD, Part I

      7:52
    • Securing SSHD, Part II

      3:15
    • Linux Firewall Fundamentals

      7:36
    • Configuring the Firewall from the Command Line

      4:03
    • Firewall Rule Specifications

      4:43
    • Example Firewall Rules

      3:59
    • Linux Firewall Rules

      9:47
    • TCP Wrappers, Part I

      7:02
    • TCP Wrappers, Part II

      4:02
    • File System Security - Section Overview

      1:02
    • File and Directory Permissions, Intro

      0:32
    • File and Directory Permissions, Part I

      11:14
    • File and Directory Permissions, Part II

      9:28
    • Special Modes, Part I

      7:56
    • Special Modes, Part II

      3:04
    • File Attributes

      6:05
    • File Attributes Demo

      2:48
    • ACLs

      9:25
    • ACLs Demo

      6:13
    • Rootkits

      8:33
    • Rootkit Hunter Demonstration

      7:12
    • Additional Security Resources

      4:52

About This Class

Secure any Linux server from hackers & protect it against hacking. The practical Linux Administration security guide.

6bc74363

9

Students

--

Projects

0

Reviews (0)

Jason Cannon started his career as a Unix and Linux System Engineer in 1999. Since that time, he has utilized his Linux skills at companies such as Xerox, UPS, Hewlett-Packard, and Amazon. Additionally, he has acted as a technical consultant and independent contractor for small businesses as well as Fortune 500 companies.


Jason has professional experience with CentOS, RedHat Enterprise Linux, SUSE Linux
Enterprise Server, and Ubuntu. He has used several Linux distributions on personal projects
including Debian, Slackware, CrunchBang, and others. In addition to Linux, Jason has
experience supporting proprietary Unix operating systems including AIX, HP-UX, and Solaris.

He enjoys teaching others how to use and exploit the power of the Linux operating system.
Jason is the author of Command Line Kung Fu: Bash Scripting Tricks, Linux Shell Programming Tips, and Bash One-liners as well as Linux for Beginners: An Introduction to the Linux Operating System and Command Line. He is also the founder of http://LinuxTrainingAcademy.com, where he blogs and teaches online video training courses.