->
Oreilly - Practical Linux Security Solutions - 9781789619713
Oreilly - Practical Linux Security Solutions
by Tajinder Kalsi | Publisher: Packt Publishing | Release Date: July 2018 | ISBN: 9781789619713


Create and administer a secured Linux system in your work environmentAbout This VideoEnhance file system security and user authentication by using various security tools Code-intensive and detailed solutions that help you understand better and learn faster.More than 50 hands-on solutions to create and administer a secure Linux system locally and on a networkIn DetailWith the growing popularity of Linux, more and more administrators have started moving to this operating system to create networks or servers for any task. Due to the lack of information about security-related attacks, administrators now face issues in dealing with these attackers as quickly as possible. Learning about the different types of Linux security will help you create a more secure Linux system.This course will help you understand the various vulnerabilities faced by the system and help you to overcome them. Whether you are new to Linux administration or experienced, it provides you with the skills to work with various security tools, thereby making your systems more secure.By the end of the course, you will have mastered the art of preventing your Linux system from getting compromised.
  1. Chapter 1 : Linux Security Problems
    • The Course Overview 00:03:12
    • Introduction 00:02:16
    • Conducting Integrity Checks 00:02:34
    • Making Use of sudoers 00:03:23
    • Scanning Hosts with Nmap 00:02:57
  2. Chapter 2 : Local Filesystem Security
    • Viewing Files and Directory Details Using the ls Command 00:02:15
    • Changing File Permissions Using the chmod Command 00:04:42
    • Implementing Access Control List (ACL) 00:03:39
    • File Handling Using the mv Command 00:06:40
  3. Chapter 3 : Local Authentication in Linux
    • User Authentication and Logging 00:02:24
    • Limiting the Login Capabilities of Users 00:03:08
    • Monitoring User Activity Using Acct 00:01:48
    • Defining User Authorization Controls 00:03:39
  4. Chapter 4 : Remote Authentication
    • Remote Server/Host Access Using SSH 00:01:29
    • Disabling or Enabling SSH Root Login 00:03:22
    • Restricting Remote Access with Key-based Login into SSH 00:02:22
  5. Chapter 5 : Network Security
    • Managing the TCP/IP Network 00:03:53
    • Using Iptables to Configure a Firewall 00:05:19
    • Blocking Spoofed Addresses 00:03:24
    • Blocking Incoming Traffic 00:03:13
  6. Chapter 6 : Security Tools and Security Distros
    • Linux sXID 00:03:24
    • PortSentry 00:03:38
    • OpenSSL Server 00:04:01
    • Tripwire 00:02:56
    • Kali Linux 00:03:50
    • DEFT – Digital Evidence and Forensic Toolkit 00:02:59
  7. Chapter 7 : Patching a Bash Vulnerability
    • Understanding the Bash Vulnerability Through Shellshock 00:04:35
    • Applying Patches on the Linux Systems 00:03:45
  8. Chapter 8 : Security Monitoring and Logging
    • Viewing and Managing Log Files Using Logcheck 00:02:52
    • Monitoring a Network Using Nmap 00:03:10
    • Using Glances for System Monitoring 00:03:16
    • Using System Tools – stat 00:03:27
    • Using System Tools – strace 00:03:14
    • Using Lynis 00:04:13
  9. Oreilly - Practical Linux Security Solutions


 TO MAC USERS: If RAR password doesn't work, use this archive program: 

RAR Expander 0.8.5 Beta 4  and extract password protected files without error.


 TO WIN USERS: If RAR password doesn't work, use this archive program: 

Latest Winrar  and extract password protected files without error.


 Coktum   |  

Information
Members of Guests cannot leave comments.




rss