O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Practical Linux Security Solutions

Video Description

Create and administer a secured Linux system in your work environment

About This Video

  • Enhance file system security and user authentication by using various security tools
  • Code-intensive and detailed solutions that help you understand better and learn faster.
  • More than 50 hands-on solutions to create and administer a secure Linux system locally and on a network

In Detail

With the growing popularity of Linux, more and more administrators have started moving to this operating system to create networks or servers for any task. Due to the lack of information about security-related attacks, administrators now face issues in dealing with these attackers as quickly as possible. Learning about the different types of Linux security will help you create a more secure Linux system.

This course will help you understand the various vulnerabilities faced by the system and help you to overcome them. Whether you are new to Linux administration or experienced, it provides you with the skills to work with various security tools, thereby making your systems more secure.

By the end of the course, you will have mastered the art of preventing your Linux system from getting compromised.

Table of Contents

  1. Chapter 1 : Linux Security Problems
    1. The Course Overview 00:03:12
    2. Introduction 00:02:16
    3. Conducting Integrity Checks 00:02:34
    4. Making Use of sudoers 00:03:23
    5. Scanning Hosts with Nmap 00:02:57
  2. Chapter 2 : Local Filesystem Security
    1. Viewing Files and Directory Details Using the ls Command 00:02:15
    2. Changing File Permissions Using the chmod Command 00:04:42
    3. Implementing Access Control List (ACL) 00:03:39
    4. File Handling Using the mv Command 00:06:40
  3. Chapter 3 : Local Authentication in Linux
    1. User Authentication and Logging 00:02:24
    2. Limiting the Login Capabilities of Users 00:03:08
    3. Monitoring User Activity Using Acct 00:01:48
    4. Defining User Authorization Controls 00:03:39
  4. Chapter 4 : Remote Authentication
    1. Remote Server/Host Access Using SSH 00:01:29
    2. Disabling or Enabling SSH Root Login 00:03:22
    3. Restricting Remote Access with Key-based Login into SSH 00:02:22
  5. Chapter 5 : Network Security
    1. Managing the TCP/IP Network 00:03:53
    2. Using Iptables to Configure a Firewall 00:05:19
    3. Blocking Spoofed Addresses 00:03:24
    4. Blocking Incoming Traffic 00:03:13
  6. Chapter 6 : Security Tools and Security Distros
    1. Linux sXID 00:03:24
    2. PortSentry 00:03:38
    3. OpenSSL Server 00:04:01
    4. Tripwire 00:02:56
    5. Kali Linux 00:03:50
    6. DEFT – Digital Evidence and Forensic Toolkit 00:02:59
  7. Chapter 7 : Patching a Bash Vulnerability
    1. Understanding the Bash Vulnerability Through Shellshock 00:04:35
    2. Applying Patches on the Linux Systems 00:03:45
  8. Chapter 8 : Security Monitoring and Logging
    1. Viewing and Managing Log Files Using Logcheck 00:02:52
    2. Monitoring a Network Using Nmap 00:03:10
    3. Using Glances for System Monitoring 00:03:16
    4. Using System Tools – stat 00:03:27
    5. Using System Tools – strace 00:03:14
    6. Using Lynis 00:04:13