Udemy – Linux Security & Hardening, The Practical Approach – Sikhar Verma
English | Tutorial | Size: 1.6GB
Linux Security guide with practical hardening tips to prevent Linux server from hackers & protect it against hacking.
Introduction
· About Security
· Tips & Tricks
Physical Security of a Linux Box
· Overview of Physical Security
· BIOS Firmware Security
· Set BIOS Password
· Single User Mode Security (RHEL6/7)
· How to set password at Single User Mode
· Securing Boot Loader
· Section Summary
PAM (Pluggable Authentication Modules)
· Overview of PAM Security
· Concepts of PAM
· PAM Modules & Configurations
· PAM Module Groups
· Control Flags in PAM
· PAM Modules
Account Security
· Overview of User Account Security
· User Account Information
· Forcing strong passwords
· Pam_pwquality – Password strength-checking
· Security by Account Locked
· Account Locked using pam_faillock PAM module – Lab Session
· Understanding Password Aging Policy
· Practice Lab Session
File System Security
· Overview of File & Directory Permission
· Access mode
· Change Permission & Ownership
· ACL
· Controlling files with ACL
· ACLs demo
· Practice Lab Session
General Security
· Keep your system updated
· Disable USB stick
· Turn off IPv6
· Restrict users to use old passwords
· Check password expiration
· Verify accounts for Empty password
· Verify accounts for “Zero” UID
· Review logs regularly
· Keep /boot as read only
Network Security
· Overview of Network Security
· Openssh Security
· Securing SSHD
· Linux Firewall
· Packet flow via firewall
· Configuring the Firewall from the Command Line
· Enable, Disable services at firewall
· Port forwarding in firewall
· Secure web server via firewall
· Masquerading & port forwarding – Lab Session
· Rich rules using firewalld
Implementing Mandatory Access Control with SELinux
· How SELinux Can Benefit a Systems Administrator?
· SELinux Security Concepts
· SELinux Modes
· SELinux – Lab Session
· Configuring SELinux Contexts
· SELinux Booleans
· Audit logs & Troubleshooting SELinux
RAPIDGATOR
rapidgator.net/file/e420694f0f3225d7a1218a727b6d3f38/Udemy_-_Linux_Security_&_Hardening,_The_Practical_Approach_-_Sikhar_Verma.part1.rar.html
rapidgator.net/file/c50cde4338889c0a0c1bad36123a9d13/Udemy_-_Linux_Security_&_Hardening,_The_Practical_Approach_-_Sikhar_Verma.part2.rar.html
rapidgator.net/file/0fd8607c2dd0b5f3cf066030fa486d65/Udemy_-_Linux_Security_&_Hardening,_The_Practical_Approach_-_Sikhar_Verma.part3.rar.html
NITROFLARE
nitroflare.com/view/DE4941A15E987F1/Udemy_-_Linux_Security_%26_Hardening%2C_The_Practical_Approach_-_Sikhar_Verma.part1.rar
nitroflare.com/view/EB8E8664F09CB08/Udemy_-_Linux_Security_%26_Hardening%2C_The_Practical_Approach_-_Sikhar_Verma.part2.rar
nitroflare.com/view/A193D1E7460C1DE/Udemy_-_Linux_Security_%26_Hardening%2C_The_Practical_Approach_-_Sikhar_Verma.part3.rar