Linux Security and Hardening

——   Created by Jason Cannon

The Practical Security Guide

Share this course:

NEW
Course
51
Lessons
4h 15m
Lesson time
all
Skill levels

More about this course

JOIN THE OTHER 40,000 SUCCESSFUL STUDENTS WHO HAVE ALREADY MASTERED THE LINUX OPERATING SYSTEM WITH ONE OF MY TOP RATED COURSES!

Keep yourself and your company out of the news by protecting your Linux systems from hackers, crackers, and attackers!

This course will not only teach you the security concepts and guidelines that will keep your Linux servers safe, it will walk you through hardening measures step-by-step.

Hello. My name is Jason Cannon and I'm the author of Linux Administration, the founder of the Linux Training Academy, and an instructor to thousands of satisfied students. I started my IT career in the late 1990's as a Unix and Linux System Engineer. I've worked for many technology companies who take information security seriously. I've even worked for security firms such as Mandiant and FireEye. I'll be sharing my real-world Linux security experience with you throughout this course.

By the end of this course you will be able to tighten up the security on any Linux system. You'll learn the security weaknesses of the Linux operating system and be given step-by-step instructions on how to protect those weaknesses. You'll even learn some security concepts that apply to information security as a whole while focusing on the Linux specific issues that require special consideration.

Here is just some of what you will learn by taking this Linux Security and Hardening course:

  • How to protect your Linux systems against hackers.
  • Ways to prevent attackers from breaking into your systems, even when they have physical access to your machine.
  • How to enforce strong password policies and control password as well as account aging policies on your Linux servers.
  • SSH Hardening practices.
  • Network security tactics.
  • Port scanning and network service detection.
  • How the Linux firewall works and exactly how to configure it.
  • How to protect the superuser (root) account.
  • Ways to share accounts securely with an audit trail.
  • File system security and encryption.
  • Using and configuring sudo, and why you need to.
  • Advanced Linux permissions include special modes, file attributes, and access control lists (ACLs).
  • Much, much more!

What you learn in course applies to any Linux environment or distribution including Ubuntu, Debian, Linux Mint, RedHat, CentOS, Fedora, OpenSUSE, Slackware, Kali Linux and more.

51 Lessons

Course Overview
0:01:25
Course overview
free preview
General Security
0:01:09
General Security Principles Overview
free preview
0:02:26
Is Linux Secure?
free preview
0:08:18
What Makes Linux Secure?
0:07:41
Security Guidelines and Principles
0:01:36
Summary
Physical Security
0:00:58
Physical Security Overview
0:07:41
Physical Security Concepts
0:06:45
Single User Mode Security
0:03:13
Single User Mode and Blank Passwords
0:07:01
Securing the Boot Loader
0:05:34
Disk Encryption
View more lessons +
This course is included in Arbington Premium
$15/month gets you access to every course. Start your 14 day trial today. ☝️

Class benefits

  • Certificate of Completion
  • 30 day satisfaction guarantee
  • 24/7 streaming access
  • Direct teacher access
  • 4h 15m of on-demand video
  • 1 downloadable file
  • Have a coupon?

About the instructor

Jason started his career as a Unix and Linux System Engineer in 1999. Since that time he has utilized his Linux skills at companies such as Xerox, UPS, Hewlett-Packard, and Amazon.com. Additionally, he has acted as a technical consultant and independent contractor for small businesses and Fortune 500 companies. Jason …

View full profile

For super learners, get unlimited access for $15 per month

Start your 14 day free trial. Cancel at any time.

Join Today Learn More