SELinux on Redhat (CentOS)
3.3 (25 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
2,789 students enrolled

SELinux on Redhat (CentOS)

Security Enhanced Linux by performing hands on tasks.
3.3 (25 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
2,789 students enrolled
Created by Javed Akbar
Last updated 4/2020
English
English [Auto]
Current price: $13.99 Original price: $19.99 Discount: 30% off
5 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 1 hour on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Students will be able to perform Linux security by installing and configuring SELinux.
Requirements
  • You will need to have some basic Linux CLI knowledge.
  • It would be beneficial to have some background on OS based security.
Description
  • This course will take the students through the installation and configuration of SELinux.
  • You will be able to perform basic to advanced level tasks to enhance the security and OS hardening of your server.
  • While learning about how to configure and troubleshoot SELinux students will also learn how to do a lot of other preliminary tasks in Linux system administration.
  • All the software used in the course is free and therefore should be accessible by all without any licensing issues.


Who this course is for:
  • Those who are trying to learn Linux and how to do perform OS hardening.
Course content
Expand all 16 lectures 57:03
+ SELinux Policy
9 lectures 37:05
Creating test users
02:54
Process and files
06:03
Policies - 1
02:06
Policies - 2
04:00
Policy - 3
03:11
Policies - 4
02:11
Process Security Context - 1
03:28
Process access resources
07:20
Context Inheritance
05:52