
English | Size: 4.71 GB
Genre: eLearning
What you’ll learn
By the end of this course you will be able to apply most of the security measures in your Linux environment
You will be able to pass the Redhat Certified Engineer exam (EX300)
You will reduce the risk of your Linux system being hacked or attacked
You will have expert knowledge of Linux account and system securities
Overview of the course:
There are total of 10 sections in this course
Section 1 – Introduction and Course Overview
Course Overview
Download Syllabus
Section 2 – Security Concepts
What is Security and OS Hardening?
Comparing House Security with Computer Security
Securing All Operating Systems
Importance of Linux Security
Security Implementation Tools
Type of Security Breach
Quiz, Handouts and Homework
Section 3 – Lab Setup (optional)
What is VirtualBox?
Installing Oracle VirtualBox
Creating First Virtual Machine
Linux Installation
Section 4 – Securing User Environment
Understanding /etc/passwd, /etc/group and /etc/shadow
The /etc/login.def File
Create User Account and Change Password
Change Password Parameters
Set Password Policy
Lock or Disable User Accounts Automatically
Lock or Disable User Accounts Manually
Lock User Account After 3 Failed Attempts
Restrict root Login
Disable SSH Access for a Specific User
Implement UID/GID Policy
Centralized Authentication Service
sudo Access
Monitor User Activity
Section 5 – PAM (Pluggable Authentication Module)
What is PAM?
The Importance of PAM
The PAM Configuration Files Format
PAM Config File – Module Interfaces
Account Access Through PAM
PAM Config File – Control Flags
PAM Config File – Modules (SO)
PAM Aware Services and Stacks
Section 6 – Securing Linux Filesystem
Linux File Types
Linux File Attributes
Linux File Ownership and Permissions
Changing File Permission
Changing File Ownership
Access Control List (ACL)
Section 7 – Securing Linux System
Message of the Day and customizing message of the day
Physical Server Security
Remove Unnecessary or Orphan Packages
Keep Kernel and System Up to Date
Stop and Disable Unwanted Services
Separate Disk Partitions
Disable Ctrl+Alt+Delete
Running One Service per System
Change Default Console Passwords
Disable USB Stick Detection
Enable Network Time Protocol (NTP or Chronyd)
Lockdown Cronjobs
Change SSH Ports
SELinux (longest lecture and lab)
Backups
Section 8 – Securing Linux System Network
Introduction to Firewall
iptables (tables, chains and targets)
iptables (practical examples)
Firewall (firewalld)
firewalld (Practical Examples)
firewalld (GUI)
Encrypt Incoming and Outgoing Traffic
SSH vs. Telnet
Turn Off IPV6 (If not in use)
Section 9 – Securing Environment Around Linux
Hardware/Network Firewall
Network Address Translation (NAT)
VPN Tunnel
Application and Database Encryption
Section 10 – Additional Resources
Many more lectures on Linux…

[ppwp passwords=”tut4dl” headline=”Password : tut4dl”]

https://nitroflare.com/view/F21C4A1737B48D8/Complete.Linux.Security_Hardening.with.Practical.Examples.17.8.part01.rar
https://nitroflare.com/view/60F4B614D883F20/Complete.Linux.Security_Hardening.with.Practical.Examples.17.8.part02.rar
https://nitroflare.com/view/9D15173BBBAEEB0/Complete.Linux.Security_Hardening.with.Practical.Examples.17.8.part03.rar
https://nitroflare.com/view/BD79C9F8B4695C4/Complete.Linux.Security_Hardening.with.Practical.Examples.17.8.part04.rar
https://nitroflare.com/view/DEB8D282793BED2/Complete.Linux.Security_Hardening.with.Practical.Examples.17.8.part05.rar
https://nitroflare.com/view/2F9173C9E22A75B/Complete.Linux.Security_Hardening.with.Practical.Examples.17.8.part06.rar
https://nitroflare.com/view/1CDBE8BE720C73D/Complete.Linux.Security_Hardening.with.Practical.Examples.17.8.part07.rar
https://nitroflare.com/view/593634CB3F66E5C/Complete.Linux.Security_Hardening.with.Practical.Examples.17.8.part08.rar
https://nitroflare.com/view/25FDB378FBA990B/Complete.Linux.Security_Hardening.with.Practical.Examples.17.8.part09.rar
https://nitroflare.com/view/8063FF3C9E24F25/Complete.Linux.Security_Hardening.with.Practical.Examples.17.8.part10.rar
https://nitroflare.com/view/06B0094DCF7AA73/Complete.Linux.Security_Hardening.with.Practical.Examples.17.8.part11.rar
https://nitroflare.com/view/D89C32785A0B373/Complete.Linux.Security_Hardening.with.Practical.Examples.17.8.part12.rar
https://nitroflare.com/view/0DDD3D7D2917148/Complete.Linux.Security_Hardening.with.Practical.Examples.17.8.part13.rar

https://rapidgator.net/file/2958085705d4b39ebb753690178854de/Complete.Linux.Security_Hardening.with.Practical.Examples.17.8.part01.rar.html
https://rapidgator.net/file/df93d861004f6d4971dc38704c269fe6/Complete.Linux.Security_Hardening.with.Practical.Examples.17.8.part02.rar.html
https://rapidgator.net/file/6d7d76b99cbcbed56b9a50b7344dbc3d/Complete.Linux.Security_Hardening.with.Practical.Examples.17.8.part03.rar.html
https://rapidgator.net/file/df1d52360951252774e5d6733454e7a8/Complete.Linux.Security_Hardening.with.Practical.Examples.17.8.part04.rar.html
https://rapidgator.net/file/94f78c1c49c9a6a200ea38cb956dbee6/Complete.Linux.Security_Hardening.with.Practical.Examples.17.8.part05.rar.html
https://rapidgator.net/file/65f4c06c6318174d98a20bbb7795b618/Complete.Linux.Security_Hardening.with.Practical.Examples.17.8.part06.rar.html
https://rapidgator.net/file/0105e474ed68ddbf3969de181ff8bab9/Complete.Linux.Security_Hardening.with.Practical.Examples.17.8.part07.rar.html
https://rapidgator.net/file/e6296a98b8f4150b4f1ce55f5f16ef16/Complete.Linux.Security_Hardening.with.Practical.Examples.17.8.part08.rar.html
https://rapidgator.net/file/083a3340e75817b1a79f463bd3bbe289/Complete.Linux.Security_Hardening.with.Practical.Examples.17.8.part09.rar.html
https://rapidgator.net/file/ed2080c1ed0e178bf67317c387001205/Complete.Linux.Security_Hardening.with.Practical.Examples.17.8.part10.rar.html
https://rapidgator.net/file/a84f6be49c8498a3d85f354cacb70dac/Complete.Linux.Security_Hardening.with.Practical.Examples.17.8.part11.rar.html
https://rapidgator.net/file/5ead9cb4fcbe75b546889cf1b92893af/Complete.Linux.Security_Hardening.with.Practical.Examples.17.8.part12.rar.html
https://rapidgator.net/file/57555efb6a1e4b8d59946154070eebe4/Complete.Linux.Security_Hardening.with.Practical.Examples.17.8.part13.rar.html
[/ppwp]
If any links die or problem unrar, send request to
https://forms.gle/e557HbjJ5vatekDV9
Leave a Reply