English | MP4 | AVC 1920×1080 | AAC 48KHz 2ch | 1h 55m | 452 MB
Create and administer a secured Linux system in your work environment
With the growing popularity of Linux, more and more administrators have started moving to this operating system to create networks or servers for any task. Due to the lack of information about security-related attacks, administrators now face issues in dealing with these attackers as quickly as possible. Learning about the different types of Linux security will help you create a more secure Linux system.
This course will help you understand the various vulnerabilities faced by the system and help you to overcome them. Whether you are new to Linux administration or experienced, it provides you with the skills to work with various security tools, thereby making your systems more secure.
By the end of the course, you will have mastered the art of preventing your Linux system from getting compromised.
An easy-to-follow guide with a step-by-step approach to various problems covering various Linux security administration tasks.
What You Will Learn
- Learn about various vulnerabilities and exploits in relation to Linux systems
- Configure and build a secure kernel and test it
- Learn about file permissions and security and how to securely modify files
- Explore various ways to authenticate local users while monitoring their activities.
- Authenticate users remotely and securely copy files on remote systems
- Review various network security methods (including firewalls) using iptables and TCP Wrapper
- Explore various security tools including Port Sentry, Squid Proxy, Shorewall, and many more
- Understand Bash vulnerability/security and patch management