Udemy

Platform

English

Language

Network & Security

Category

Linux Security & Hardening, The Practical Approach

Linux Security guide with practical hardening tips to prevent Linux server from hackers & protect it against hacking.

4.15 (110 reviews)

Students

7 hours

Content

Oct 2018

Last Update
Regular Price


What you will learn

Physical Security of a Linux Box

BIOS Firmware Security

Single User Mode Security (RHEL6,7)

Securing Boot Loader

Overview of PAM Security

Concepts of PAM

PAM Modules & Configurations

Control Flags in PAM

User Account Security

Forcing strong passwords

Security by Account Locked

Understanding Password Aging Policy

Overview of File & Directory Permission

Controlling files with ACL

General Security

Overview of Network Security

Securing SSHD

Linux Firewall

Port forwarding & Masquerading using firewall

Implementing Mandatory Access Control with SELinux

SELinux Security Concepts

Audit logs & Troubleshooting SELinux


Description

Introduction

·        About Security

·        Tips & Tricks

 

Physical Security of a Linux Box

·        Overview of Physical Security

·        BIOS Firmware Security

·        Set BIOS Password

·        Single User Mode Security (RHEL6/7)

·        How to set password at Single User Mode

·        Securing Boot Loader

·        Section Summary

 

PAM (Pluggable Authentication Modules)

·        Overview of PAM Security

·        Concepts of PAM

·        PAM Modules & Configurations

·        PAM Module Groups

·        Control Flags in PAM

·        PAM Modules

 

Account Security

·        Overview of User Account Security

·        User Account Information

·        Forcing strong passwords

·        Pam_pwquality - Password strength-checking

·        Security by Account Locked

·        Account Locked using pam_faillock PAM module - Lab Session

·        Understanding Password Aging Policy

·        Practice Lab Session

 

File System Security

·        Overview of File & Directory Permission

·        Access mode

·        Change Permission & Ownership

·        ACL

·        Controlling files with ACL

·        ACLs demo

·        Practice Lab Session

 

General Security

·        Keep your system updated

·        Disable USB stick

·        Turn off IPv6

·        Restrict users to use old passwords

·        Check password expiration

·        Verify accounts for Empty password

·        Verify accounts for “Zero” UID

·        Review logs regularly

·        Keep /boot as read only

 

Network Security

·        Overview of Network Security

·        Openssh Security

·        Securing SSHD

·        Linux Firewall

·        Packet flow via firewall

·        Configuring the Firewall from the Command Line

·        Enable, Disable services at firewall

·        Port forwarding in firewall

·        Secure web server via firewall

·        Masquerading & port forwarding - Lab Session

·        Rich rules using firewalld

 

Implementing Mandatory Access Control with SELinux

·        How SELinux Can Benefit a Systems Administrator?

·        SELinux Security Concepts

·        SELinux Modes

·        SELinux – Lab Session

·        Configuring SELinux Contexts

·        SELinux Booleans

·        Audit logs & Troubleshooting SELinux



Screenshots

Linux Security & Hardening, The Practical Approach
Linux Security & Hardening, The Practical Approach
Linux Security & Hardening, The Practical Approach
Linux Security & Hardening, The Practical Approach

Content

Introduction

Introduction

Security Tips & Tricks

Physical Security of a Linux Box

Overview of Physical Security

BIOS Firmware Security

Set BIOS Password

Single User Mode Security

Password at Single User Mode

Securing the Boot Loader

Section Summary

PAM (Pluggable Authentication Modules)

Overview of PAM Security

Concepts of PAM

PAM Modules & Configurations

PAM Module Groups

Control Flags in PAM

PAM Modules

Account Security

Overview of User Account Security

User Account Information

Forcing Strong Passwords

Pam_pwquality - Password strength-checking

Security by Account Locked

Account Locked using pam_faillock PAM module - Lab Session

prevent the system from locking users

Understanding Password Aging Policy

Practice Lab Session

File System Security

Overview of File & Directory Permission

Understanding File Permission

Practice Lab Session - File Permission Security

Access Mode

Change permission & ownership

Practice Lab Session

ACL Security

Controlling Access to files with ACL

ACLs demo

Practice Lab Session on ACL - 1

Practice Lab Session on ACL - 2

General Security

General Security

Keep your system updated

Disable USB Stick to detect

Turn off IPv6

Restrict Users to Use Old Passwords

Check Password Expiration of a User

Password Expiration - Lab Session

Verify accounts for empty password

Verify accounts with "Zero" UID

Review logs regularly

Keep /boot as read only

Network Security

Network Security Part 1

Network Security Part 2

Overview of OpenSSH

Securing SSHD Part 1

Securing SSHD Part 2

Linux Firewall

Packet flow via firewall

Configuring the Firewall from the Command Line

Enable, disable services at firewall

Port forwarding in firewall

Secure web server via firewall - Part 1

Secure Web Server via firewall - Part 2

Masquerading & port forwarding - Lab Session

Rich rules using firewalld

Rich Rule - Lab Session 1

Rich Rule - Lab Session 2

Implementing Mandatory Access Control with SELinux

How SELinux Can Benefit a Systems Administrator?

SELinux Security Concepts

SELinux Modes

SELinux - Lab Session 1

SELinux - Lab Session 2

Changing SELinux Contexts

SELinux Booleans

SELinux - Lab Session 3

Audit logs & Troubleshooting SELinux

Last Lecture


Reviews

O
Olivier23 May 2020

All sections are not present on slides. I've chosen this course to learn SELinux but i need to understand far more than what it's explained to be able to use it in real world. From my point of view, this lesson is a (quite good) introduction to Linux Hardening that must be completed and deepened.

C
Chris6 March 2019

This course was Outstanding, Mr Verma is I think The best Instructor on Udemy. Take this course and you will see for yourself. I have taken several of his courses, and each course is well thought out for a student to learn, his courses are not simple Basic courses, like some i have taken from other instructors. His mission for each course is for you not only learn his material, but learn it in detail. Please keep the courses coming!

A
Abdullah23 December 2018

The course & instructor are good, The only thing I it doesn't say its more about red hat system so at least you know which Linux sys you going for.

S
Syed19 October 2018

An extremely well-designed & Amazing course. with a very well rounded curriculum. Shikar is an excellent instructor. I have had a great time going through this course. I am so glad that I decided to take this course.Thank you..

D
Damien15 October 2018

So far (chapter one), the course is well done en clear. It would be better if we could have the transcript feature for those of use who are not fluent in english.


Coupons

DateDiscountStatus
2/27/202190% OFFExpired

1954786

Udemy ID

10/8/2018

Course created date

11/21/2019

Course Indexed date
Bot
Course Submitted by