Video description
Create and administer a secured Linux system in your work environment
About This Video
- Enhance file system security and user authentication by using various security tools
- Code-intensive and detailed solutions that help you understand better and learn faster.
- More than 50 hands-on solutions to create and administer a secure Linux system locally and on a network
In Detail
With the growing popularity of Linux, more and more administrators have started moving to this operating system to create networks or servers for any task. Due to the lack of information about security-related attacks, administrators now face issues in dealing with these attackers as quickly as possible. Learning about the different types of Linux security will help you create a more secure Linux system.
This course will help you understand the various vulnerabilities faced by the system and help you to overcome them. Whether you are new to Linux administration or experienced, it provides you with the skills to work with various security tools, thereby making your systems more secure.
By the end of the course, you will have mastered the art of preventing your Linux system from getting compromised.
Table of contents
-
Chapter 1 : Linux Security Problems
- The Course Overview 00:03:12
- Introduction 00:02:16
- Conducting Integrity Checks 00:02:34
- Making Use of sudoers 00:03:23
- Scanning Hosts with Nmap 00:02:57
- Chapter 2 : Local Filesystem Security
-
Chapter 3 : Local Authentication in Linux
- User Authentication and Logging 00:02:24
- Limiting the Login Capabilities of Users 00:03:08
- Monitoring User Activity Using Acct 00:01:48
- Defining User Authorization Controls 00:03:39
- Chapter 4 : Remote Authentication
-
Chapter 5 : Network Security
- Managing the TCP/IP Network 00:03:53
- Using Iptables to Configure a Firewall 00:05:18
- Blocking Spoofed Addresses 00:03:24
- Blocking Incoming Traffic 00:03:13
-
Chapter 6 : Security Tools and Security Distros
- Linux sXID 00:03:24
- PortSentry 00:03:38
- OpenSSL Server 00:04:01
- Tripwire 00:02:56
- Kali Linux 00:03:50
- DEFT – Digital Evidence and Forensic Toolkit 00:02:59
- Chapter 7 : Patching a Bash Vulnerability
-
Chapter 8 : Security Monitoring and Logging
- Viewing and Managing Log Files Using Logcheck 00:02:52
- Monitoring a Network Using Nmap 00:03:10
- Using Glances for System Monitoring 00:03:16
- Using System Tools – stat 00:03:27
- Using System Tools – strace 00:03:14
- Using Lynis 00:04:13
Product information
- Title: Practical Linux Security Solutions
- Author(s):
- Release date: July 2018
- Publisher(s): Packt Publishing
- ISBN: 9781789619713
You might also like
book
Linux Basics for Hackers
If you’re getting started along the exciting path of hacking, cybersecurity, and pentesting, Linux Basics for …
video
Learning Linux Security
In this Learning Linux Security training course, expert author Ric Messier will teach you how to …
book
The Linux Command Line, 2nd Edition
The Linux Command Line takes you from your very first terminal keystrokes to writing full programs …
video
The Complete Cybersecurity Bootcamp (Video Collection): Threat Defense, Ethical Hacking, and Incident Handling
More than 25 Hours of Expert Video Instruction This course is a complete guide to help …