Linux Security and Hardening

Running Linux in a Virtual Environment

1
LSH – Looking at the threat landscape
2
LSH – Why do security breaches happen?
3
LSH – Keeping up with security news
4
LSH – Differences between physical, virtual, and cloud setups
5
LSH – Introducing VirtualBox and Cygwin
6
LSH – Keeping the Linux systems updated

Securing User Accounts

1
LSH – The dangers of logging in as the root user
2
LSH – The advantages of using sudo
3
LSH – Setting up sudo privileges for full administrative users
4
LSH – Setting up sudo for users with only certain delegated privileges
5
LSH – Advanced tips and tricks for using sudo
6
LSH – Locking down users’ home directories the Red Hat or CentOS way
7
LSH – Locking down users’ home directories the Debian/Ubuntu way
8
LSH – Enforcing strong password criteria
9
LSH – Setting and enforcing password and account expiration
10
LSH – Configuring default expiry data for useradd for Red Hat or CentOS only
11
LSH – Setting expiry data on a per-account basis with useradd and usermod
12
LSH – Setting expiry data on a per-account basis with chage
13
LSH – Preventing brute-force password attacks
14
LSH – Locking user accounts
15
LSH – Locking the root user account
16
LSH – Setting up security banners
17
LSH – Detecting compromised passwords
18
LSH – Understanding centralized user management

Securing Your Server with a Firewall

1
LSH – An overview of firewalld
2
LSH – An overview of iptables
3
LSH – Uncomplicated firewall for Ubuntu systems
4
LSH – nftables – a more universal type of firewall system
5
LSH – Firewalld for Red Hat systems

Encryption Technologies

1
LSH – GNU Privacy Guard (GPG)
2
LSH – Encrypting partitions with Linux Unified Key Setup (LUKS)
3
LSH – Encrypting directories with eCryptfs
4
LSH – Using VeraCrypt for cross-platform sharing of encrypted containers
5
LSH – OpenSSL and the public key infrastructure

SSH Hardening

1
LSH – Ensuring that SSH protocol 1 is disabled
2
LSH – Creating and managing keys for passwordless logins
3
LSH – Disabling root user login
4
LSH – Disabling username/password logins
5
LSH – Configuring Secure Shell with strong encryption algorithms
6
LSH – Setting system-wide encryption policies on RHEL 8/CentOS 8
7
LSH – Configuring more detailed logging
8
LSH – Configuring access control with whitelists and TCP Wrappers
9
LSH – Configuring automatic logouts and security banners
10
LSH – Configuring other miscellaneous security settings
11
LSH – Setting up a chroot environment for SFTP users
12
LSH – Sharing a directory with SSHFS
13
LSH – Remotely connecting from Windows desktops

Mastering Discretionary Access Control

1
LSH – Using chown to change ownership of files and directories
2
LSH – Using chmod to set permissions on files and directories
3
LSH – Using SUID and SGID on regular files
4
LSH – The security implications of the SUID and SGID permissions
5
LSH – Using extended file attributes to protect sensitive files
6
LSH – Securing system configuration files

Access Control Lists and Shared Directory Management

1
LSH – Creating an ACL for either a user or a group
2
LSH – Creating an inherited ACL for a directory
3
LSH – Removing a specific permission by using an ACL mask
4
LSH – Using the tar –acls option to prevent the loss of ACLs during a backup
5
LSH – Creating a user group and adding members to it
6
LSH – Creating a shared directory
7
LSH – Setting the SGID bit and the sticky bit on the shared directory
8
LSH – Using ACLs to access files in the shared directory

Implementing Mandatory Access Control with SELinux and AppArmor

1
LSH – How SELinux can benefit a systems administrator
2
LSH – Setting security contexts for files and directories
3
LSH – Troubleshooting with setroubleshoot
4
LSH – Working with SELinux policies
5
LSH – How AppArmor can benefit a systems administrator
6
LSH – Looking at AppArmor profiles
7
LSH – Working with AppArmor command-line utilities
8
LSH – Troubleshooting AppArmor problems
9
LSH – Exploiting a system with an evil Docker container

Kernel Hardening and Process Isolation

1
LSH – Understanding the /proc filesystem
2
LSH – Setting kernel parameters with sysctl
3
LSH – Configuring the sysctl.conf file
4
LSH – Understanding process isolation

Scanning | Auditing and Hardening

1
LSH – Installing and updating ClamAV and maldet
2
LSH – Scanning with ClamAV and maldet
3
LSH – Scanning for rootkits with Rootkit Hunter
4
LSH – Performing a quick malware analysis with strings and VirusTotal
5
LSH – Understanding the auditd daemon
6
LSH – Using ausearch and aureport
7
LSH – Applying OpenSCAP policies with oscap

Logging and Log Security

1
LSH – Understanding the Linux system log files
2
LSH – Understanding rsyslog
3
LSH – Understanding journald
4
LSH – Making things easier with Logwatch
5
LSH – Setting up a remote log server

Vulnerability Scanning and Intrusion Detection

1
LSH – Introduction to Snort and Security Onion
2
LSH – IPFire and its built-in Intrusion Prevention System (IPS)
3
LSH – Scanning and hardening with Lynis
4
LSH – Finding vulnerabilities with OpenVAS
5
LSH – Web server scanning with Nikto

Security Tips and Tricks for the Busy Bee

1
LSH – Auditing system services
2
LSH – Password protecting the GRUB 2 bootloader
3
LSH – Securely configuring BIOS/UEFI
4
LSH – Using a security checklist for system setup

Be the first to add a review.

Please, login to leave a review
Add to Wishlist
Enrolled: 0 students
Lectures: 95

Archive

Working hours

Monday 9:30 am - 6.00 pm
Tuesday 9:30 am - 6.00 pm
Wednesday 9:30 am - 6.00 pm
Thursday 9:30 am - 6.00 pm
Friday 9:30 am - 5.00 pm
Saturday Closed
Sunday Closed
Linux Security and Hardening
Price:
Free