Linux Servers provide many user transactions, which are constantly vulnerable to security threats, due to data sensitivity. To bring an application up and running on a server is an important thing, but without taking security measures, it can end up in a disaster. Although Linux is immune to some of the dangers Windows servers encounters, Internet is still a dangerous place. Therefore it's important to apply security measures to prevent malicious attacks like brute force attack, etc.
This course was designed to show some practical tips on how to protect your server, that once applied, they will increase the level of security on your system and decrease the chances of it being compromised.
Along with the video lectures, you will also find exercises to help you improve your hands-on experience. You will benefit for free from any new lectures and updates on the course.
Keep in mind that if you are not happy with the course, you can ask for a refund and take advantage of 30-Day Money-Back Guarantee.
In this lecture, I have explained the common-auth file from /etc/pam.d
What happens if /etc/securetty exists and it's empty?
I am a Linux System Administrator with more than 4 years experience, also M.Sc.Eng. in Computer Science.
I also have several certifications for the field I work in such as:
- LPIC-1: System Administrator
- LPIC-2: Linux Engineer
- ITILv3 Foundation Level
I am glad to be part of Udemy Community and also very eager to share my passion and knowledge about Linux with you.