Instructed by Imran Afzal
What you’ll learn
-
By the end of this course you will be able to apply most of the security measures in your Linux environment
-
You will be able to pass the Redhat Certified Engineer exam (EX300)
-
You will reduce the risk of your Linux system being hacked or attacked
-
You will have expert knowledge of Linux account and system securities
Security Concepts
- What is Security and OS Hardening?
- Comparing House Security with Computer Security
- Securing All Operating Systems
- Importance of Linux Security
- Security Implementation Tools
- Type of Security Breach
- Quiz, Handouts and Homework
Lab Setup (optional)
- What is VirtualBox?
- Installing Oracle VirtualBox
- Creating First Virtual Machine
- Linux Installation
Securing User Environment
- Understanding /etc/passwd, /etc/group and /etc/shadow
- The /etc/login.def File
- Create User Account and Change Password
- Change Password Parameters
- Set Password Policy
- Lock or Disable User Accounts Automatically
- Lock or Disable User Accounts Manually
- Lock User Account After 3 Failed Attempts
- Restrict root Login
- Disable SSH Access for a Specific User
- Implement UID/GID Policy
- Centralized Authentication Service
- sudo Access
- Monitor User Activity
PAM (Pluggable Authentication Module)
- What is PAM?
- The Importance of PAM
- The PAM Configuration Files Format
- PAM Config File – Module Interfaces
- Account Access Through PAM
- PAM Config File – Control Flags
- PAM Config File – Modules (SO)
- PAM Aware Services and Stacks
Securing Linux Filesystem
- Linux File Types
- Linux File Attributes
- Linux File Ownership and Permissions
- Changing File Permission
- Changing File Ownership
- Access Control List (ACL)
Securing Linux System
- Message of the Day and customizing message of the day
- Physical Server Security
- Remove Unnecessary or Orphan Packages
- Keep Kernel and System Up to Date
- Stop and Disable Unwanted Services
- Separate Disk Partitions
- Disable Ctrl+Alt+Delete
- Running One Service per System
- Change Default Console Passwords
- Disable USB Stick Detection
- Enable Network Time Protocol (NTP or Chronyd)
- Lockdown Cronjobs
- Change SSH Ports
- SELinux (longest lecture and lab)
- Backups
Securing Linux System Network
- Introduction to Firewall
- iptables (tables, chains and targets)
- iptables (practical examples)
- Firewall (firewalld)
- firewalld (Practical Examples)
- firewalld (GUI)
- Encrypt Incoming and Outgoing Traffic
- SSH vs. Telnet
- Turn Off IPV6 (If not in use)
Securing Environment Around Linux
- Hardware/Network Firewall
- Network Address Translation (NAT)
- VPN Tunnel
- Application and Database Encryption
Who this course is for:
- Anyone who wants to have complete understanding Linux security and OS hardening
- Anyone who wants to advance his/her career
- Anyone who wants to pass the RHCE EX300 exam
Similar Udemy Course Coupons
Deal Score0
Disclosure: This post may contain affiliate links and we may get small commission if you make a purchase. Read more about Affiliate disclosure here.