O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Mastering Linux Security and Hardening

Video Description

A comprehensive guide to mastering the art of preventing your Linux system from getting compromised.

About This Video

  • Leverage this guide to confidently deliver a system that reduces the risk of being hacked
  • Perform a number of advanced Linux security techniques such as network service detection, user authentication, controlling special permissions, encrypting file systems, and much more
  • Master the art of securing a Linux environment with this end-to-end practical guide

In Detail

This course has extensive coverage of techniques that will help prevent attackers from breaching your system, by building a much more secure Linux environment. You will learn various security techniques such as SSH hardening, network service detection, setting up firewalls, encrypting file systems, protecting user accounts, authentication processes, and so on. Moving forward, you will also develop hands-on skills with advanced Linux permissions, access control, special modes, and more. Lastly, this course will also cover best practices and troubleshooting techniques to get your work done efficiently. By the end of this course, you will be confident in delivering a system that will be much harder to compromise..

Table of Contents

  1. Chapter 1 : Running Linux in a Virtual Environment
    1. The Course Overview 00:05:09
    2. The Threat Landscape and Keeping Up with Security News 00:04:20
    3. Introduction to VirtualBox and Cygwin 00:14:01
  2. Chapter 2 : Securing User Accounts
    1. Setting Up sudo Privileges for Full Administrative Users 00:05:40
    2. Setting Up sudo for Users with Only Certain Delegated Privileges 00:03:13
    3. Advanced Tips and Tricks for Using sudo 00:03:21
    4. Locking Down Users' Home Directories the Red Hat/CentOS and Debian/Ubuntu Way 00:04:35
    5. Enforcing Strong Password Criteria 00:04:58
    6. Setting and Enforcing Password and Account Expiration 00:10:43
    7. Preventing Brute-Force Password Attacks 00:06:11
    8. Locking User Accounts 00:05:17
  3. Chapter 3 : Securing Your Server with a Firewall
    1. An Overview of iptables 00:11:10
    2. Uncomplicated Firewall for Ubuntu Systems 00:03:19
    3. firewalld for Red Hat Systems 00:12:14
    4. nftables – A More Universal Type of Firewall System 00:13:32
  4. Chapter 4 : Encrypting and SSH Hardening
    1. GNU Privacy Guard 00:08:27
    2. Encrypting Partitions with Linux Unified Key Setup – LUKS 00:02:14
    3. Encrypting Directories with eCryptfs 00:04:48
    4. Using VeraCrypt for Cross-Platform Sharing of Encrypted Containers 00:04:15
    5. Ensuring that SSH Protocol 1 Is Disabled 00:01:24
    6. Creating a User’s SSH Key Set 00:02:13
    7. Disabling Username/Password Logins 00:02:33
  5. Chapter 5 : Mastering Discretionary Access Control
    1. Changing Ownership of Files and Directories 00:03:30
    2. Setting Permissions Values 00:03:59
    3. Using SUID and SGID 00:04:51
    4. Protecting Sensitive Files 00:05:08
  6. Chapter 6 : Access Control Lists and Shared Directory Management
    1. Creating an Access Control List 00:03:27
    2. Creating an Inherited Access Control List 00:02:31
    3. Removing a Specific Permission 00:01:48
    4. Preventing Loss of ACLs 00:03:50
    5. Creating a User Group and Adding Members to It 00:05:12
    6. Setting the SGID Bit and the Sticky Bit 00:03:46
    7. Accessing Files in the Shared Directory 00:03:07
  7. Chapter 7 : Implementing Mandatory Access Control with SELinux and AppArmor
    1. How SELinux Can Benefit a Systems Administrator? 00:04:02
    2. Setting Security Contexts for Files and Directories 00:11:56
    3. Troubleshooting with setroubleshoot 00:04:15
    4. Working with SELinux Policies 00:09:39
    5. Looking at AppArmor Profiles 00:02:24
    6. Working with AppArmor Command-Line Utilities 00:04:26
  8. Chapter 8 : Scanning, Auditing, and Hardening
    1. Installing and Updating ClamAV and maldet 00:06:34
    2. Scanning with ClamAV and maldet 00:01:50
    3. SELinux Considerations 00:01:23
    4. Scanning for Rootkits with Rootkit Hunter 00:04:24
    5. Controlling the auditd Daemon and Creating Audit Rule 00:08:36
    6. Using ausearch and aureport 00:07:30
    7. Scanning and Hardening with Lynis 00:04:08