From the course: Complete Guide to Linux Security: Protecting Your Linux Server Environment
Unlock this course with a free trial
Join today to access over 24,300 courses taught by industry experts.
Encryption in Linux - Linux Tutorial
From the course: Complete Guide to Linux Security: Protecting Your Linux Server Environment
Encryption in Linux
- Let's briefly talk about encryption in Linux and run a quick mini lab. Encryption is the process of converting plaintext into ciphertext. This is usually done with some type of cryptographic key. The whole point, so other users can't read your data, or so you can select who can read your data. Only those who hold the appropriate key can decipher the information. Now, as a note, keep in mind that encryption is a learning course all of its own. We could spend weeks on it. My goal is just to show a little bit of the basics and one example within Linux, and maybe a tiny bit of the beyond. So here's our mini lab. What we're going to do is we're going to install GPG. So that's the GNU Privacy Guard, and that's a free replacement of Symantec's PGP. And that's only if you don't already have it installed. But we'll do the installation of that, if need be. Then we're going to access our /tmp directory and work within the tmp directory. If we restart the system, anything in there will be lost,…
Download courses and learn on the go
Watch courses on your mobile device without an internet connection. Download courses using your iOS or Android LinkedIn Learning app.
Contents
-
-
(Locked)
Learning objectives1m 34s
-
(Locked)
Introduction to nftables and the nft command2m 34s
-
(Locked)
nftables setup4m 5s
-
(Locked)
Tables > Chains > Rules2m 31s
-
(Locked)
Building the nftables configuration, part 18m 41s
-
(Locked)
Building the nftables configuration, part 28m 39s
-
Saving and restoring the nftables configurations8m 36s
-
(Locked)
Translating iptables to nftables7m 49s
-
(Locked)
-
-
(Locked)
Learning objectives1m 18s
-
(Locked)
Review of SSH1m 47s
-
(Locked)
Using keys to connect via SSH12m 57s
-
(Locked)
The sshd_config file3m 19s
-
(Locked)
Modifying the default SSH port7m 32s
-
(Locked)
Disabling password-based SSH2m 57s
-
(Locked)
Disabling root login via SSH2m 32s
-
(Locked)
Exclusive SSH groups4m 37s
-
(Locked)
Authentication settings10m 6s
-
(Locked)
Terminating SSH connections, part 17m 45s
-
(Locked)
Terminating SSH connections, part 26m 51s
-
(Locked)