Linux Security and Hardening, The Practical Security Guide

Jason Cannon

Play Speed
  • 0.5x
  • 1x (Normal)
  • 1.25x
  • 1.5x
  • 2x
51 Videos (4h 3m)
    • Course Overview

      1:25
    • General Security - Section Overview

      1:09
    • Is Linux Secure?

      2:26
    • What Makes Linux Secure?

      8:18
    • Security Principles and Guidelines

      7:41
    • General Security - Section Summary

      1:36
    • Physical Security - Section Summary

      0:58
    • Physical Security Concepts

      7:41
    • Single User Mode Security

      6:45
    • Single User Mode and Blank Passwords

      3:13
    • Securing the Boot Loader

      7:01
    • Disk Encryption

      5:34
    • Encrypting a New Device, Part I

      8:38
    • Encrypting a New Device, Part II

      4:17
    • Encrypting an Existing Device

      0:52
    • Disabling Control Alt Delete

      1:44
    • Physical Security - Section Summary

      0:42
    • Account Security - Section Overview

      0:45
    • Intro to PAM

      5:13
    • PAM Configuration Example

      4:04
    • Password Security

      7:58
    • Account Security Demo I

      3:11
    • Controlling Account Access

      5:06
    • Security by Account Type

      6:01
    • Account Security Demo II

      2:44
    • Account Security Demo III

      4:43
    • Network Security - Section Overview

      0:35
    • Network Security, Part I

      7:54
    • Network Security, Part II

      6:20
    • Securing SSHD, Part I

      7:52
    • Securing SSHD, Part II

      3:15
    • Linux Firewall Fundamentals

      7:36
    • Configuring the Firewall from the Command Line

      4:03
    • Firewall Rule Specifications

      4:43
    • Example Firewall Rules

      3:59
    • Linux Firewall Rules

      9:47
    • TCP Wrappers, Part I

      7:02
    • TCP Wrappers, Part II

      4:02
    • File System Security - Section Overview

      1:02
    • File and Directory Permissions, Intro

      0:32
    • File and Directory Permissions, Part I

      11:14
    • File and Directory Permissions, Part II

      9:28
    • Special Modes, Part I

      7:56
    • Special Modes, Part II

      3:04
    • File Attributes

      6:05
    • File Attributes Demo

      2:48
    • ACLs

      9:25
    • ACLs Demo

      6:13
    • Rootkits

      8:33
    • Rootkit Hunter Demonstration

      7:12
    • Additional Security Resources

      4:52

About This Class

Secure any Linux server from hackers & protect it against hacking. The practical Linux Administration security guide.

6bc74363

9

Students

--

Projects

0

Reviews (0)

Jason Cannon started his career as a Unix and Linux System Engineer in 1999. Since that time, he has utilized his Linux skills at companies such as Xerox, UPS, Hewlett-Packard, and Amazon. Additionally, he has acted as a technical consultant and independent contractor for small businesses as well as Fortune 500 companies.


Jason has professional experience with CentOS, RedHat Enterprise Linux, SUSE Linux
Enterprise Server, and Ubuntu. He has used several Linux distributions o...

See full profile