O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Learning Linux Security

Video Description

In this Learning Linux Security training course, expert author Ric Messier will teach you how to secure a Linux system. This course is designed for the absolute beginner, meaning no Linux Security experience is required.

You will start by learning about booting, then jump into covering service management. From there, Ric will teach you about logging and log management, intrusion detection and preventions, and users and permissions. This video tutorial also covers utilities and the Linux Kernel, including Kernel modules, builds, and managing Kernel parameters. Finally, you will learn about firewalls, such as iptables, targets, rate limiting, and zones and services.

Completing this computer based training course will kickstart your understanding of Linux security.

Table of Contents

  1. Introduction
    1. Introduction 00:01:51
    2. What Will Be Covered 00:02:47
    3. What Is Linux 00:03:51
    4. Distributions 00:04:02
    5. Scratch Versus Binary 00:03:59
    6. Ubuntu Package Management 00:03:19
    7. RedHat Package Management 00:04:41
  2. Booting
    1. The Boot Process 00:03:44
    2. Physical Protections 00:03:28
    3. The Boot Manager - GRUB 00:05:56
    4. Protecting The Boot Manager 00:04:02
    5. xinetd 00:04:14
    6. Runlevels 00:04:33
    7. Setting Default Runlevels 00:04:38
    8. GRUB2 00:03:13
    9. LILO 00:04:50
  3. Services
    1. Service Management 00:02:53
    2. Service Management With RHEL7 00:03:36
    3. TCP Wrappers 00:02:34
    4. Listening Ports 00:05:41
    5. Standard Postfix Configuration 00:06:06
    6. Apache Configuration 00:07:03
    7. Hardening Apache 00:07:12
    8. Virtual Hosts In Apache 00:03:55
    9. DNSSec 00:06:16
    10. MySQL 00:05:13
    11. PostgreSQL 00:04:00
    12. Tomcat 00:05:35
    13. JBoss 00:02:50
    14. mod_security 00:07:04
    15. SSL-TLS And Apache 00:06:32
    16. SPF And Greylisting In Postfix 00:04:12
  4. Logging And Log Management
    1. Syslog 00:05:57
    2. Remote Logging 00:03:51
    3. Reading Log Files 00:05:47
    4. Logwatch 00:06:28
    5. Log Aggregation 00:04:42
    6. utmp And wtmp 00:03:42
  5. Intrusion Detection And Prevention
    1. Anti-Virus 00:03:43
    2. Tripwire 00:07:08
    3. Samhaim 00:03:13
    4. Prelude 00:03:37
    5. AIDE 00:03:39
    6. Snort 00:07:06
    7. Alerting With Snort 00:05:15
    8. Snort Console 00:03:54
    9. Reading Snort Traces With Wireshark 00:02:26
    10. RootKitHunter 00:03:35
  6. Users And Permissions
    1. etc-shadow And etc-passwd Files 00:07:05
    2. Creating Users 00:03:21
    3. Securing Passwords 00:03:28
    4. Cracking Passwords 00:03:19
    5. Alternate User Management 00:03:10
    6. AppArmor 00:03:05
    7. Unix Permissions 00:04:00
    8. SELinux 00:02:51
    9. Modifying SELinux Permissions 00:03:25
    10. Restoring SELinux Permissions 00:02:38
    11. PAM 00:03:15
  7. Utilities
    1. netstat 00:03:58
    2. Process Management – top And ps 00:05:17
    3. Process Management – kill 00:04:08
    4. nmap 00:05:31
    5. OpenVAS 00:05:19
    6. Nexpose 00:05:53
    7. Find 00:03:50
    8. tcpdump 00:04:19
    9. Wireshark 00:05:31
    10. lspci And lsusb 00:02:43
  8. Kernel
    1. Linux Kernel 00:04:31
    2. Kernel Modules 00:04:15
    3. Managing Kernel Parameters 00:03:54
    4. Kernel Builds 00:05:11
    5. Kernel Config 00:02:49
    6. Viewing Kernel Config From Running Kernel 00:03:34
  9. Firewalls
    1. iptables 00:01:22
    2. NAT With iptables 00:04:36
    3. iptables Tables 00:02:14
    4. Matching On Protocol 00:04:09
    5. Rate limiting 00:02:52
    6. New Versus Established Versus Related 00:03:51
    7. Targets 00:02:20
    8. iptables Logs 00:02:47
    9. iptables With Multiple Interfaces 00:02:57
    10. Firewalld 00:02:56
    11. Zones And Services 00:02:35
    12. Matching On Owner 00:03:06
    13. ufw 00:02:53
    14. gufw 00:02:12
  10. Conclusion
    1. What We Covered 00:02:29
    2. What Comes Next 00:02:28
    3. Wrap-Up 00:00:33