From the course: Complete Guide to Linux Security: Protecting Your Linux Server Environment
Unlock this course with a free trial
Join today to access over 24,300 courses taught by industry experts.
10 steps to a secure Linux server, part 1 - Linux Tutorial
From the course: Complete Guide to Linux Security: Protecting Your Linux Server Environment
10 steps to a secure Linux server, part 1
- Let's discuss how to secure your Linux server, and these 10 steps that I'm going to go over can be applied to just about any Linux distro out there. We're going to break this into two sub lessons, let's start now and talk about 10 steps to secure your Linux server. The first step is hardware and BIOS, and it shows in italics, "Set a complex password." So hardware and BIOS. Consider a locking server case and other physical locking features for your server and server room and server racks. Also, consider hardware redundancy. You want to make sure that your power supply units, your storage devices, and your network interface cards have redundant fault tolerance and backups, right? So network interface cards, usually, a server will have four of those and maybe you add additional ones, and as far as storage goes, you might use RAID 1, RAID 5, RAID 10, and power supplies, quite often servers will come with two. So definitely look into hardware redundancy, and especially you want to have a…
Download courses and learn on the go
Watch courses on your mobile device without an internet connection. Download courses using your iOS or Android LinkedIn Learning app.
Contents
-
-
(Locked)
Learning objectives1m 34s
-
(Locked)
Introduction to nftables and the nft command2m 34s
-
(Locked)
nftables setup4m 5s
-
(Locked)
Tables > Chains > Rules2m 31s
-
(Locked)
Building the nftables configuration, part 18m 41s
-
(Locked)
Building the nftables configuration, part 28m 39s
-
Saving and restoring the nftables configurations8m 36s
-
(Locked)
Translating iptables to nftables7m 49s
-
(Locked)
-
-
(Locked)
Learning objectives1m 18s
-
(Locked)
Review of SSH1m 47s
-
(Locked)
Using keys to connect via SSH12m 57s
-
(Locked)
The sshd_config file3m 19s
-
(Locked)
Modifying the default SSH port7m 32s
-
(Locked)
Disabling password-based SSH2m 57s
-
(Locked)
Disabling root login via SSH2m 32s
-
(Locked)
Exclusive SSH groups4m 37s
-
(Locked)
Authentication settings10m 6s
-
(Locked)
Terminating SSH connections, part 17m 45s
-
(Locked)
Terminating SSH connections, part 26m 51s
-
(Locked)