Linux Security and Hardening, The Practical Security Guide

Video description

Secure any Linux server from hackers and protect it against hacking. The practical Linux Administration security guide.

About This Video

  • You will be able to harden a Linux system, reduce its surface of vulnerability, and reduce the risk of your Linux system being hacked or compromised.

In Detail

Keep yourself and your company out of the news by protecting your Linux systems from hackers, crackers, and attackers! This course will not only teach you the security concepts and guidelines that will keep your Linux servers safe, it will walk you through hardening measures step-by-step. By the end of this course, you will be able to tighten up the security on any Linux system. You'll learn the security weaknesses of the Linux operating system and will be given step-by-step instructions on how to protect those weaknesses. You'll even learn some security concepts that apply to information security as a whole while focusing on Linux-specific issues that require special consideration. What you learn in this course applies to any Linux environment or distribution including Ubuntu, Debian, Linux Mint, RedHat, CentOS, Fedora, OpenSUSE, Slackware, Kali Linux, and more.


This course targets anyone with a desire to learn how to secure and harden a computer running the Linux operating system. Linux system administrators looking to make the systems they support more secure and people thinking about a career as a Linux system administrator or engineer will benefit from this course. This course is not for people who have never used the Linux operating system before.

Publisher resources

Download Example Code

Table of contents

  1. Chapter 1 : Course Overview and Downloads
    1. Course Overview
  2. Chapter 2 : General Security
    1. Section Overview
    2. Is Linux Secure?
    3. What Makes Linux Secure?
    4. Security Guidelines and Principles
    5. Section Summary
  3. Chapter 3 : Physical Security
    1. Section Overview
    2. Physical Security Concepts
    3. Single User Mode Security
    4. Single User Mode and Blank Passwords
    5. Securing the Boot Loader
    6. Disk Encryption
    7. Encrypting a New Device, Part I
    8. Encrypting a New Device, Part II
    9. Encrypting an Existing Device
    10. Disabling Control Alt Delete
    11. Section Summary
  4. Chapter 4 : Account Security
    1. Section Overview
    2. Intro to PAM
    3. PAM Configuration Example
    4. Password Security
    5. Account Security Demo #1 (UID 0)
    6. Controlling Account Access
    7. Security by Account Type
    8. Account Security Demo #2
    9. Account Security Demo #3 (Sudo)
  5. Chapter 5 : Network Security
    1. Section Overview
    2. Network Security, Part I
    3. Network Security, Part II
    4. Securing SSHD, Part I
    5. Securing SSHD, Part II
    6. Linux Firewall Fundamentals
    7. Configuring the Firewall from the Command Line
    8. Firewall Rule Specifications
    9. Example Firewall Rules
    10. Linux Firewall Demonstration
    11. TCP Wrappers, Part I
    12. TCP Wrappers, Part II
  6. Chapter 6 : File System Security
    1. Section Overview
    2. File and Directory Permissions, Intro
    3. File and Directory Permissions, Part I
    4. File and Directory Permissions, Part II
    5. Special Modes, Part I
    6. Special Modes, Part II
    7. File Attributes
    8. File Attributes Demo
    9. ACLs
    10. ACLs Demo
    11. Rootkits
    12. Rootkit Hunter Demonstration
  7. Chapter 7 : Additional Security Resources
    1. Additional Security Resources

Product information

  • Title: Linux Security and Hardening, The Practical Security Guide
  • Author(s): Jason Cannon, Linux Training Academy
  • Release date: October 2018
  • Publisher(s): Packt Publishing
  • ISBN: 9781789612820