LEARNING FOR LIFE

Get Yourself a Better Life! Free eLearning Download

  • Technical
    • Internet & Networking
    • Security & Hacking
    • AI | Artificial intelligence
    • OS & Server
    • WEB/HTML/CSS/AJAX
    • Database & SQL
    • Programming
    • Perl & PHP
    • .Net & Java
    • Mobile Development
    • C/C++/C#
    • Game Development
    • Unix & Linux
    • MAC OS X
    • Windows
    • OFFICE
    • Operation Systems
    • Hardware
  • Graphic & Media
    • Photography
    • 3D
    • Adobe Product Training
    • Art & Drawing & Painting
    • Film & Film Making
    • Game Designing
    • Music Training
    • Tutorials for designer
  • Business
    • Business & Investing
    • Writing & Affiliate
    • Marketing
    • Sales
    • Economics & Finances
    • Seo & Site Traffic
    • Stock & ForEX
  • Life Stype
    • Self Improvement | MP
    • Mindset | NLP
    • Fashion / Clothing / Grooming
    • Seduction
    • Fighting / Martial Arts
    • Food / Drink / Cooking
    • Health / Fitness / Massage
    • Languages / Accents
    • Magic / Illusions / Tricks
    • Psychology / Body Language
  • Engineering & Science
    • Cultures & History
    • Electrical & Architecture
    • Mathematics & Physics
    • Medical
  • Entertainment
    • Comic
    • Manga
    • Novel
    • Magazine
  • PC Game
    • Mac Game
    • Xbox Game
    • Play Station Game
Home » Ebooks & Tutorials » Technical » Unix & Linux » Mastering Linux Security Hardening | Packt Publishing

Mastering Linux Security Hardening | Packt Publishing

07/05/2018 Learning for Life Leave a Comment

Mastering Linux Security Hardening | Packt Publishing
English | Size: 0.98 GB
Category: CBTs


This course has extensive coverage of techniques that will help prevent attackers from breaching your system, by building a much more secure Linux environment. You will learn various security techniques such as SSH hardening, network service detection, setting up firewalls, encrypting file systems, protecting user accounts, authentication processes, and so on. Moving forward, you will also develop hands-on skills with advanced Linux permissions, access control, special modes, and more. Lastly, this course will also cover best practices and troubleshooting techniques to get your work done efficiently. By the end of this course, you will be confident in delivering a system that will be much harder to compromise..

Style and Approach
An advanced-level guide filled with real-world examples that will help you secure your Linux system.

Table of Contents
RUNNING LINUX IN A VIRTUAL ENVIRONMENT
The Course Overview
The Threat Landscape and Keeping Up with Security News
Introduction to VirtualBox and Cygwin
SECURING USER ACCOUNTS
Setting Up sudo Privileges for Full Administrative Users
Setting Up sudo for Users with Only Certain Delegated Privileges
Advanced Tips and Tricks for Using sudo
Locking Down Users’ Home Directories the Red Hat/CentOS and Debian/Ubuntu Way
Enforcing Strong Password Criteria
Setting and Enforcing Password and Account Expiration
Preventing Brute-Force Password Attacks
Locking User Accounts
SECURING YOUR SERVER WITH A FIREWALL
An Overview of iptables
Uncomplicated Firewall for Ubuntu Systems
firewalld for Red Hat Systems
nftables – A More Universal Type of Firewall System
ENCRYPTING AND SSH HARDENING
GNU Privacy Guard
Encrypting Partitions with Linux Unified Key Setup – LUKS
Encrypting Directories with eCryptfs
Using VeraCrypt for Cross-Platform Sharing of Encrypted Containers
Ensuring that SSH Protocol 1 Is Disabled
Creating a User’s SSH Key Set
Disabling Username/Password Logins
MASTERING DISCRETIONARY ACCESS CONTROL
Changing Ownership of Files and Directories
Setting Permissions Values
Using SUID and SGID
Protecting Sensitive Files
ACCESS CONTROL LISTS AND SHARED DIRECTORY MANAGEMENT
Creating an Access Control List
Creating an Inherited Access Control List
Removing a Specific Permission
Preventing Loss of ACLs
Creating a User Group and Adding Members to It
Setting the SGID Bit and the Sticky Bit
Accessing Files in the Shared Directory
IMPLEMENTING MANDATORY ACCESS CONTROL WITH SELINUX AND APPARMOR
How SELinux Can Benefit a Systems Administrator?
Setting Security Contexts for Files and Directories
Troubleshooting with setroubleshoot
Working with SELinux Policies
Looking at AppArmor Profiles
Working with AppArmor Command-Line Utilities
SCANNING, AUDITING, AND HARDENING
Installing and Updating ClamAV and maldet
Scanning with ClamAV and maldet
SELinux Considerations
Scanning for Rootkits with Rootkit Hunter
Controlling the auditd Daemon and Creating Audit Rule
Using ausearch and aureport
Scanning and Hardening with Lynis
What You Will Learn
Use various techniques to prevent intruders from accessing sensitive data
Prevent intruders from planting malware, and detect whether malware has been planted
Prevent insiders from accessing data that they aren’t authorized to access
Do quick checks to see whether a computer is running network services that it doesn’t need to run
Learn security techniques that are common to all Linux distros, and some that are distro-specific
Authors
Donald A. Tevault
Donald A. Tevault-but you can call him Donnie-got involved with Linux way back in 2006, and has been working with it ever since. He holds the Linux Professional Institute Level 3-Security certification, and the GIAC Incident Handler certification. Donnie is a professional Linux trainer, and thanks to the magic of the internet, teaches Linux classes literally the world over from the comfort of his living room.

Buy Long-term Premium Accounts To Support Me & Max Speed

DOWNLOAD:


https://rapidgator.net/file/1457be628656c7f0e57c1d40e5663650/Mastering_Linux_Security_Hardening.part1.rar.html
https://rapidgator.net/file/ed8638b66832c83b5b36badcaeeb12c8/Mastering_Linux_Security_Hardening.part2.rar.html


http://nitroflare.com/view/85465CC82C22C1E/Mastering_Linux_Security_Hardening.part1.rar
http://nitroflare.com/view/B462B1C7CF81F98/Mastering_Linux_Security_Hardening.part2.rar

If any links die or problem unrar, send request to http://goo.gl/aUHSZc

Unix & Linux Hardening, Linux, Mastering, Packt Publishing, Security

← Mastering Clean Code in Javascript [Packt] (2018) Mastering System Administration with PowerShell 6 →

About Learning for Life

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

  • The Foundry Nuke 16.0v2 [Win]
  • Chaos Vantage 2.8.0
  • FXPHD – DOP217 – pimp my lenses
  • Brass-TENOKE
  • Udemy – Complete Python With DSA Bootcamp + LEETCODE Exercises

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

2019 2020 2021 2022 2023 2024 Advanced AWS Azure BBC Beginners BitBook BOOKWARE Certified Cisco Cloud Comic Complete Course Data Design eBook Fundamentals Guide Hybrid iLEARN Introduction JavaScript Learn Learning LinkedIn Linux Lynda Masterclass Microsoft Packt Pluralsight Programming Python Security Skillshare Training Udemy Using XQZT

Copyright © 2025 · Equilibre on Genesis Framework · WordPress · Log in