Mastering Linux Security [Video]

More Information
  • Secure your Linux machine from hackers
  • Configure the kernel against remote attacks
  • Use SUID/SGID to explore your local system security
  • Work with the kernel and libraries
  • Secure communication with VPNs
  • Configure important security software

Do you worry about hackers hacking into your system running locally or remotely? Then this course is for you; you will learn (via practical examples) how to secure your system from such attacks.

In this course, you will learn to secure workstations and servers against unauthorized persons.

We start with the three critical fundamentals that must be dealt with first: updates, passwords, and firewalls. We then give you an overview of what it actually means to secure a system, what an attack surface is, how hackers perform attacks and how to successfully protect against them. You will learn to secure a Linux machine, by securely configuring and running services, performing logging, secure backups, and more. The course will show you how to secure your system locally or remotely. Finally, you will be shown how to verify your set up.

By the end of the course, you will have mastered security on Linux systems.

Style and Approach

An exhaustive course packed with step-by-step instructions, working examples, and helpful advice on protecting your Linux system. This course is divided into clear chunks, so you can learn at your own pace and focus on your own areas of interest.

  • A comprehensive and friendly guide to understanding how to secure your Linux System.
  • Covers security with fully up-to-date techniques, code examples, and use cases.
  • A practical tutorial designed to help network engineers understand security
Course Length 2 hours 17 minutes
ISBN 9781788836074
Date Of Publication 30 Jul 2018


Marc Heuse

Marc “van Hauser” Heuse started to be interested in IT security in 1993. He founded one of the world's oldest security research communities—The Hacker's Choice (—and is the author of several well-known security tools such as hydra, amap, thc-ipv6, THC-SCAN, SuSE firewall, and many others. From 1998 to 2007 he worked for SuSE, hardened the Linux distribution, and built-up the security team. Today he is an independent consultant and security researcher. Just for fun he records training courses on how to secure Linux servers.