Cyber Security: Secure Passwords on Linux
What you'll learn
- Best practices for Securing Passwords
- Understand how a Hacker gets access to Passwords
- Basics of GPG, Pass and Keepass
- How to setup Yubikey to work with Pass
- How to setup Trezor to work with Pass
- How to sign files with a Security Key
- Basic knowledge of Linux / OpenBSD / FreeBSD / Mac OS X
- Command line knowledge
Passwords play an important role in our digital lives. 87% of the Americans re-use passwords. Many online users get hacked with bad consequences. What can you do to make yourself more secure?
In this course you will learn about various ways to secure your passwords. From a hackers view you will learn which methods are safer than others. The course contains demonstrations that shows how a hacker might get access to the passwords.
You will learn how to protect yourself. About password method so secure, that even if your computer is hacked your passwords will still be secure.
The methods on this course have been tested with Debian/Ubuntu Linux and some on OpenBSD. The methods should work with Mac OS X too.
This is a course for intermediate users, who are familiar with the command line. It is not a beginners course, some of the setups in this course can be quite challenging.
Basic knowledge of Linux is recommended. You will learn about gpg and security keys amongst other things and see various ways of how a hacker may get passwords. The course contains various quizes.
If you want to have more security in your daily live, enroll today and learn how to secure passwords.
Who this course is for:
- Linux users that want more secure passwords
- Developers (Linux, Mac)
- Sysadmins (Linux, *BSD)
Ethical Hacker with Software Development background. I first started programming long ago as a hobby and along the way learned many things. I've programmed in basic, c++, java and many other languages. I'm programming as a hobby. I've used a variety of operating systems and also database systems. I'm here to share my experience. Then I got into Ethical Hacking