Content
Part of the learning process before transitioning into the specific use cases for cybersecurity is learning the very basics. Once you get the basics down, you can start to apply your knowledge and run specific programs for security. Learning how to effectively navigate and interact with Linux can be an important part of your learning journey in cybersecurity. This crash course walks you through the basics including how to configure your own Linux environment, navigate the command line, and apply our basic knowledge to a security use. The boot directory, for example, contains several important files that are related to the Linux kernel. This directory should be set to read-only so that the data on this partition can be accessed, but not changed unless the server is booted into single-user recovery mode. The most important part of BIOS security is the easiest and most obvious – a secured BIOS should require password authentication for access.
As an instructor and consultant Sean has traveled worldwide sharing his knowledge as well as gaining exposure to many different environments and cultures along the way. His broad knowledge and easy to understand manner, with a healthy dose of humor, have led to him being a regularly requested instructor and public speaker. Attendees should have a basic understanding of Linux system commands, system administration and basic security concepts. This course is a comprehensive look at the security challenges that can affect almost every system, especially with the seamless connectivity we seek from the Internet. The class starts with an overview of computer security and touches on how security affects everyone in the chain of development, implementation, administration and the end user. Jason has professional experience with CentOS, RedHat Enterprise Linux, SUSE Linux Enterprise Server, and Ubuntu. He has used several Linux distributions on personal projects including Debian, Slackware, CrunchBang, and others.
Lynis (security scanner and compliance auditing tool)
This course introduces students to the security features and tools available in Linux as well as the considerations, advantages, and disadvantages of using those features. For example, we dive into Security-Enhanced Linux and see why it is important to use it with Apache and how it benefits us. SELinux represents mandatory access controls , allowing fine-grain access controls for resources such as files, devices, networks, and inter-process communication. In many cases, administrators disable SELinux because it causes complications with Apache, and there is not enough time to configure everything correctly in the system. Covered will be common network services that may be present on servers and client systems. In the networking section, you’ll learn how to secure network services that run on Linux systems. You’ll also learn how the local firewall works in Linux and how to configure it.
- Lynis is an open source security tool that can test these specific items.
- Access to this page has been denied because we believe you are using automation tools to browse the website.
- Attendees should have a basic understanding of Linux system commands, system administration and basic security concepts.
- This class explores many of these options to secure the systems.
- In the networking section, you’ll learn how to secure network services that run on Linux systems.
The way I learn is by doing, not by watching and the instructor does a good job with demo’s that I can actually pause the video and carry out on my own machine. He is also very easy to understand, does not speak overly fast and covers information well. First off I have to say I have been a real Linux fan for about three years now. I install different distros Linux Hardening and Security Lessons on everything from my everyday laptop, Raspberry Pi’s to desktop machines. I have always thought Linux to be relatively secure…and it is however if you want to take it a step further this is a course for you. The final exam will cover how to determine the security requirements for a given system as well as how to configure each to meet a given requirement.
Linux Server Hardening: Best Practices
All 22,000 IP addresses will be locked out, but not before I’ve been able to scan all 65,536 available ports to uncover that hidden SSH server. In my Linux Attack and Defense webinar series, I demonstrate attacks on Linux systems, then show how proactive security hardening could block the attacks. The immense value of proactive hardening is that it can eliminate security vulnerabilities that you don’t even know are present.
Where a typical vulnerability scanner will just point out vulnerabilities, Lynis aims for an in-depth audit and continuous improvement. For this reason, it needs to be executed on the host system itself. By seeing the system from the inside out, it can provide more specific details than the average vulnerability scanner. Bastille Linux was a popular tool to perform hardening of systems running Linux and other flavors. As an added bonus for enrolling in this Linux Server Security video training course, you’ll receive access to all the slides used in the lessons. You can download them and refer to them when you want to jog your memory or double-check your work. My name is Jason Cannon and I’m the author of Linux Administration, the founder of the Linux Training Academy, and an instructor to thousands of satisfied students.
Secure any Linux server from hackers and protect it against hacking. The practical Linux Administration security guide.
System-level hardening, including keeping your system updates current and enforcing strong passwords helps to prevent the newest threats on the web. Network-level hardening helps reduce your system’s points of failure, and alert level hardening helps us to stay informed.
How the Linux firewall works and exactly how to configure it. This course covers a range of points to consider when securing your Linux systems and the best strategies to take. The overall rating is calculated using the average of submitted ratings. Ratings and reviews can only be submitted when non-anonymous learners complete at least 40% of the course. Share what you’ve learned, and be a standout professional in your desired industry with a certificate showcasing your knowledge gained from the course.
Linux Security
For most environments, it is suggested to choose the combination of an audit tool and a configuration management tool . This way changes are better controlled and settings can be documented. Approaching system hardening with a four-level approach is an effective way to secure your system in multiple areas. Locking down the BIOS and separating partitions sets a secure foundation at the machine level.
- He is also very easy to understand, does not speak overly fast and covers information well.
- This way changes are better controlled and settings can be documented.
- Simply stated, network ports that aren’t being used shouldn’t be left open.
- This course is part of LiveLessons Video Training series on Pearson IT Certification.
- I encourage you to download Breach2 and a Kali Linux virtual machine and then follow along with both the attack and defense in the webinar.
- Your Red Hat account gives you access to your member profile, preferences, and other services depending on your customer status.