Mastering Linux Security and Hardening [Video]

Preview in Mapt
Code Files

Mastering Linux Security and Hardening [Video]

Donald A. Tevault
New Release!

A comprehensive guide to mastering the art of preventing your Linux system from getting compromised.
Mapt Subscription
FREE
$29.99/m after trial
Video
$10.00
RRP $124.99
Save 91%
What do I get with a Mapt Pro subscription?
  • Unlimited access to all Packt’s 5,000+ eBooks and Videos
  • Early Access content, Progress Tracking, and Assessments
  • 1 Free eBook or Video to download and keep every month after trial
What do I get with an eBook?
  • Download this book in EPUB, PDF, MOBI formats
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
What do I get with Print & eBook?
  • Get a paperback copy of the book delivered to you
  • Download this book in EPUB, PDF, MOBI formats
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
What do I get with a Video?
  • Download this Video course in MP4 format
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
$0.00
$10.00
$29.99 p/m after trial
RRP $124.99
Subscription
Video
Start 14 Day Trial

Frequently bought together


Mastering Linux Security and Hardening [Video] Book Cover
Mastering Linux Security and Hardening [Video]
$ 124.99
$ 10.00
Mastering Linux Security and Hardening Book Cover
Mastering Linux Security and Hardening
$ 35.99
$ 10.00
Buy 2 for $20.00
Save $140.98
Add to Cart

Video Details

ISBN 139781789340884
Course Length4 hours and 5 minutes

Video Description

This course has extensive coverage of techniques that will help prevent attackers from breaching your system, by building a much more secure Linux environment. You will learn various security techniques such as SSH hardening, network service detection, setting up firewalls, encrypting file systems, protecting user accounts, authentication processes, and so on. Moving forward, you will also develop hands-on skills with advanced Linux permissions, access control, special modes, and more. Lastly, this course will also cover best practices and troubleshooting techniques to get your work done efficiently. By the end of this course, you will be confident in delivering a system that will be much harder to compromise..

Style and Approach

An advanced-level guide filled with real-world examples that will help you secure your Linux system.

Table of Contents

Running Linux in a Virtual Environment
The Course Overview
The Threat Landscape and Keeping Up with Security News
Introduction to VirtualBox and Cygwin
Securing User Accounts
Setting Up sudo Privileges for Full Administrative Users
Setting Up sudo for Users with Only Certain Delegated Privileges
Advanced Tips and Tricks for Using sudo
Locking Down Users' Home Directories the Red Hat/CentOS and Debian/Ubuntu Way
Enforcing Strong Password Criteria
Setting and Enforcing Password and Account Expiration
Preventing Brute-Force Password Attacks
Locking User Accounts
Securing Your Server with a Firewall
An Overview of iptables
Uncomplicated Firewall for Ubuntu Systems
firewalld for Red Hat Systems
nftables – A More Universal Type of Firewall System
Encrypting and SSH Hardening
GNU Privacy Guard
Encrypting Partitions with Linux Unified Key Setup – LUKS
Encrypting Directories with eCryptfs
Using VeraCrypt for Cross-Platform Sharing of Encrypted Containers
Ensuring that SSH Protocol 1 Is Disabled
Creating a User’s SSH Key Set
Disabling Username/Password Logins
Mastering Discretionary Access Control
Changing Ownership of Files and Directories
Setting Permissions Values
Using SUID and SGID
Protecting Sensitive Files
Access Control Lists and Shared Directory Management
Creating an Access Control List
Creating an Inherited Access Control List
Removing a Specific Permission
Preventing Loss of ACLs
Creating a User Group and Adding Members to It
Setting the SGID Bit and the Sticky Bit
Accessing Files in the Shared Directory
Implementing Mandatory Access Control with SELinux and AppArmor
How SELinux Can Benefit a Systems Administrator?
Setting Security Contexts for Files and Directories
Troubleshooting with setroubleshoot
Working with SELinux Policies
Looking at AppArmor Profiles
Working with AppArmor Command-Line Utilities
Scanning, Auditing, and Hardening
Installing and Updating ClamAV and maldet
Scanning with ClamAV and maldet
SELinux Considerations
Scanning for Rootkits with Rootkit Hunter
Controlling the auditd Daemon and Creating Audit Rule
Using ausearch and aureport
Scanning and Hardening with Lynis

What You Will Learn

  • Use various techniques to prevent intruders from accessing sensitive data
  • Prevent intruders from planting malware, and detect whether malware has been planted
  • Prevent insiders from accessing data that they aren’t authorized to access
  • Do quick checks to see whether a computer is running network services that it doesn’t need to run
  • Learn security techniques that are common to all Linux distros, and some that are distro-specific

Authors

Table of Contents

Running Linux in a Virtual Environment
The Course Overview
The Threat Landscape and Keeping Up with Security News
Introduction to VirtualBox and Cygwin
Securing User Accounts
Setting Up sudo Privileges for Full Administrative Users
Setting Up sudo for Users with Only Certain Delegated Privileges
Advanced Tips and Tricks for Using sudo
Locking Down Users' Home Directories the Red Hat/CentOS and Debian/Ubuntu Way
Enforcing Strong Password Criteria
Setting and Enforcing Password and Account Expiration
Preventing Brute-Force Password Attacks
Locking User Accounts
Securing Your Server with a Firewall
An Overview of iptables
Uncomplicated Firewall for Ubuntu Systems
firewalld for Red Hat Systems
nftables – A More Universal Type of Firewall System
Encrypting and SSH Hardening
GNU Privacy Guard
Encrypting Partitions with Linux Unified Key Setup – LUKS
Encrypting Directories with eCryptfs
Using VeraCrypt for Cross-Platform Sharing of Encrypted Containers
Ensuring that SSH Protocol 1 Is Disabled
Creating a User’s SSH Key Set
Disabling Username/Password Logins
Mastering Discretionary Access Control
Changing Ownership of Files and Directories
Setting Permissions Values
Using SUID and SGID
Protecting Sensitive Files
Access Control Lists and Shared Directory Management
Creating an Access Control List
Creating an Inherited Access Control List
Removing a Specific Permission
Preventing Loss of ACLs
Creating a User Group and Adding Members to It
Setting the SGID Bit and the Sticky Bit
Accessing Files in the Shared Directory
Implementing Mandatory Access Control with SELinux and AppArmor
How SELinux Can Benefit a Systems Administrator?
Setting Security Contexts for Files and Directories
Troubleshooting with setroubleshoot
Working with SELinux Policies
Looking at AppArmor Profiles
Working with AppArmor Command-Line Utilities
Scanning, Auditing, and Hardening
Installing and Updating ClamAV and maldet
Scanning with ClamAV and maldet
SELinux Considerations
Scanning for Rootkits with Rootkit Hunter
Controlling the auditd Daemon and Creating Audit Rule
Using ausearch and aureport
Scanning and Hardening with Lynis

Video Details

ISBN 139781789340884
Course Length4 hours and 5 minutes
Read More

Read More Reviews

Recommended for You

Mastering Linux Security and Hardening Book Cover
Mastering Linux Security and Hardening
$ 35.99
$ 10.00
AWS MasterClass: Networking And Virtual Private Cloud (VPC) [Video] Book Cover
AWS MasterClass: Networking And Virtual Private Cloud (VPC) [Video]
$ 190.99
$ 10.01
Projects in Linux [Video] Book Cover
Projects in Linux [Video]
$ 59.99
$ 10.00
Hands-on Application Development with ASP.NET Core and Angular [Video] Book Cover
Hands-on Application Development with ASP.NET Core and Angular [Video]
$ 124.99
$ 10.00
ARP Spoofing and Man In The Middle Attacks: Execution and Detection [Video] Book Cover
ARP Spoofing and Man In The Middle Attacks: Execution and Detection [Video]
$ 49.99
$ 10.00
Integrating Twitter and Facebook into Your iOS Apps [Video] Book Cover
Integrating Twitter and Facebook into Your iOS Apps [Video]
$ 124.99
$ 10.00