O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Linux Security and Hardening, The Practical Security Guide

Video Description

Secure any Linux server from hackers and protect it against hacking. The practical Linux Administration security guide.

About This Video

  • You will be able to harden a Linux system, reduce its surface of vulnerability, and reduce the risk of your Linux system being hacked or compromised.

In Detail

Keep yourself and your company out of the news by protecting your Linux systems from hackers, crackers, and attackers! This course will not only teach you the security concepts and guidelines that will keep your Linux servers safe, it will walk you through hardening measures step-by-step. By the end of this course, you will be able to tighten up the security on any Linux system. You'll learn the security weaknesses of the Linux operating system and will be given step-by-step instructions on how to protect those weaknesses. You'll even learn some security concepts that apply to information security as a whole while focusing on Linux-specific issues that require special consideration. What you learn in this course applies to any Linux environment or distribution including Ubuntu, Debian, Linux Mint, RedHat, CentOS, Fedora, OpenSUSE, Slackware, Kali Linux, and more.

Downloading the example code for this course: You can download the example code files for all Packt video courses you have purchased from your account at http://www.PacktPub.com. If you purchased this course elsewhere, you can visit http://www.PacktPub.com/support and register to have the files e-mailed directly to you.

Table of Contents

  1. Chapter 1 : Course Overview and Downloads
    1. Course Overview 00:01:26
  2. Chapter 2 : General Security
    1. Section Overview 00:01:10
    2. Is Linux Secure? 00:02:27
    3. What Makes Linux Secure? 00:08:19
    4. Security Guidelines and Principles 00:07:41
    5. Section Summary 00:01:36
  3. Chapter 3 : Physical Security
    1. Section Overview 00:00:58
    2. Physical Security Concepts 00:07:41
    3. Single User Mode Security 00:06:46
    4. Single User Mode and Blank Passwords 00:03:13
    5. Securing the Boot Loader 00:07:02
    6. Disk Encryption 00:05:35
    7. Encrypting a New Device, Part I 00:08:38
    8. Encrypting a New Device, Part II 00:04:17
    9. Encrypting an Existing Device 00:00:52
    10. Disabling Control Alt Delete 00:01:45
    11. Section Summary 00:00:43
  4. Chapter 4 : Account Security
    1. Section Overview 00:00:46
    2. Intro to PAM 00:05:14
    3. PAM Configuration Example 00:04:05
    4. Password Security 00:07:58
    5. Account Security Demo #1 (UID 0) 00:03:11
    6. Controlling Account Access 00:05:07
    7. Security by Account Type 00:06:02
    8. Account Security Demo #2 00:02:44
    9. Account Security Demo #3 (Sudo) 00:04:43
  5. Chapter 5 : Network Security
    1. Section Overview 00:00:35
    2. Network Security, Part I 00:07:55
    3. Network Security, Part II 00:06:21
    4. Securing SSHD, Part I 00:07:52
    5. Securing SSHD, Part II 00:03:16
    6. Linux Firewall Fundamentals 00:07:37
    7. Configuring the Firewall from the Command Line 00:04:04
    8. Firewall Rule Specifications 00:04:44
    9. Example Firewall Rules 00:04:00
    10. Linux Firewall Demonstration 00:09:48
    11. TCP Wrappers, Part I 00:07:03
    12. TCP Wrappers, Part II 00:04:02
  6. Chapter 6 : File System Security
    1. Section Overview 00:01:03
    2. File and Directory Permissions, Intro 00:00:32
    3. File and Directory Permissions, Part I 00:11:14
    4. File and Directory Permissions, Part II 00:09:28
    5. Special Modes, Part I 00:07:56
    6. Special Modes, Part II 00:03:05
    7. File Attributes 00:06:06
    8. File Attributes Demo 00:02:48
    9. ACLs 00:09:25
    10. ACLs Demo 00:06:14
    11. Rootkits 00:08:34
    12. Rootkit Hunter Demonstration 00:07:12
  7. Chapter 7 : Additional Security Resources
    1. Additional Security Resources 00:04:52