Discover how to tighten security on any Linux system. Learn basic security concepts and guidelines that can help Linux system administrators keep their system safe from attackers.
Overview
Syllabus
Introduction
- Welcome
- General security
- Is Linux secure?
- What makes Linux secure?
- Security guidelines and principles
- Section summary: General security
- Physical security
- Physical security concepts
- Single user mode security
- Single user mode and blank passwords
- Secure the bootloader
- Disk encryption
- Encrypt a new device: Part 1
- Encrypt a new device: Part 2
- Encrypt an existing device
- Disable Control-Alt-Delete
- Section summary: Physical security
- Account security
- Introduction to PAM
- PAM configuration example
- Password security
- Account security: Demo 1 (UID 0)
- Control account access
- Security by account type
- Account security: Demo 2
- Account security: Demo 3 (Sudo)
- Network security
- Network security: Part 1
- Network security: Part 2
- Secure SSHD: Part 1
- Secure SSHD: Part 2
- Linux firewall fundamentals
- Configure the firewall from the command line
- Firewall rule specifications
- Example firewall rules
- Linux firewall demo
- TCP Wrappers: Part 1
- TCP Wrappers: Part 2
- File system security
- Introduction to file and directory permissions
- File and directory permissions: Part 1
- File and directory permissions: Part 2
- Special modes: Part 1
- Special modes: Part 2
- File attributes
- File attributes demo
- ACLs
- ACLs demo
- Rootkits
- Rootkit hunter demo
- Summary
Taught by
Jason Cannon