From the course: Complete Guide to Linux Security: Protecting Your Linux Server Environment
Linux security: Basics and beyond - Linux Tutorial
From the course: Complete Guide to Linux Security: Protecting Your Linux Server Environment
Linux security: Basics and beyond
- Hello and welcome to Linux Security-Basics and Beyond. I'm Dave Prowse. It's great to have you here, and I hope you enjoy this course. Security is the fastest growing field in IT, and Linux dominates the server market both on premises and in the cloud, so knowledge of Linux security is of paramount importance. In this course, we focus on Linux when used as a server, but we'll cover some client side Linux security as well. Either way, Linux systems need to be hardened, patched, updated, and locked down, in other words, secured. The Linux skillset is incredibly valuable for people who want to work in the IT field. Knowledge of Linux is a great addition to your resume. The goal of this course is to show you exactly how to secure Linux distributions so they'll be protected from attacks, and will continue to function for a long period of time without the need for a reboot. A little bit about me. I have over 20 years of experience in the IT field, and have written books and created video courses and live training for a variety of topics, including Linux infrastructure as code, computer networking, and security. I'm an advocate of lifelong learning, self-improvement, building confidence, and the sharing of knowledge. That's why I built this course. Speaking of which, this course is divided into four modules. The first is Linux User Security. Then it's securing Linux Operating Systems. After that, we have Firewalls and Securing SSH, and finally, Working With Security Tools in Linux. Within each module, you will find several lessons. Each lesson is broken down into short, manageable sub-lessons. To aid your learning process, I'm providing you with a repository of lab documents. Get them from the link shown on the screen at github.com/daveprowse/linux-security. You can read them directly on GitHub or download the entire repository if you wish. As usual, with my course content, the bulk of this video course is made up of hands-on demonstrations, so be sure that you have a couple of Linux systems available. They could be physical or virtual machines. I'll be focusing on Debian and Ubuntu servers, CentOS server, and I'll also be running a Debian Linux client with the GNOME desktop among other distros. See the lab setup document in the repository for more information and suggestions. Have any questions? I'm here for you. You can contact me at my website at prowse.tech, or at my Discord server, which is linkable from my website. I am very excited about this video course. If you like it, consider leaving a positive review. That's it for the introduction. Let's start securing some Linux systems.
Download courses and learn on the go
Watch courses on your mobile device without an internet connection. Download courses using your iOS or Android LinkedIn Learning app.
Contents
-
-
(Locked)
Learning objectives1m 34s
-
(Locked)
Introduction to nftables and the nft command2m 34s
-
(Locked)
nftables setup4m 5s
-
(Locked)
Tables > Chains > Rules2m 31s
-
(Locked)
Building the nftables configuration, part 18m 41s
-
(Locked)
Building the nftables configuration, part 28m 39s
-
Saving and restoring the nftables configurations8m 36s
-
(Locked)
Translating iptables to nftables7m 49s
-
(Locked)
-
-
(Locked)
Learning objectives1m 18s
-
(Locked)
Review of SSH1m 47s
-
(Locked)
Using keys to connect via SSH12m 57s
-
(Locked)
The sshd_config file3m 19s
-
(Locked)
Modifying the default SSH port7m 32s
-
(Locked)
Disabling password-based SSH2m 57s
-
(Locked)
Disabling root login via SSH2m 32s
-
(Locked)
Exclusive SSH groups4m 37s
-
(Locked)
Authentication settings10m 6s
-
(Locked)
Terminating SSH connections, part 17m 45s
-
(Locked)
Terminating SSH connections, part 26m 51s
-
(Locked)