Linux Security Fundamentals: Level up your security skills

This course will cover how to secure a Linux System. It will focus on Centos and Red Hat 7.
4.6 (22 ratings) Instead of using a simple lifetime average, Udemy calculates a
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
687 students enrolled Bestselling in Security
$19
$20
5% off
Take This Course
  • Lectures 40
  • Length 4.5 hours
  • Skill Level Intermediate Level
  • Languages English
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion
Wishlisted Wishlist

How taking a course works

Discover

Find online courses made by experts from around the world.

Learn

Take your courses with you and learn anywhere, anytime.

Master

Learn and practice real-world skills and achieve your goals.

About This Course

Published 2/2016 English

Course Description

Are you interested in learning more about Linux Security? Then this is course for you! This course will teach you how to better secure a Linux system as well as understand how various Linux security controls work to increase security and meet compliance with various regulations. You will learn fundamentals of security such as users, permissions as well as more advanced topics like Selinux, auditing and PAM. You will also learn how to set up various services such as Rsyslog.

This course is a mix of lecture and demos to help you understand the concepts. To succeed in this course you should have a basic understanding of Linux System administration to include things like setting up networking, editing files and basic file management. This course focuses on Centos and Red Hat Linux, but some of the concepts would apply to other distributions as well. I would recommend you have access to a Centos or Red Hat system so you can follow along with some of the demos. Access can be provided by Amazon AWS and you can use the free tier if desired.

I am not affiliated in any way with either Red Hat or Centos.


What are the requirements?

  • How to configure networking in Linux
  • How to use the Linux shell command prompt
  • Basic text editing from the Linux command prompt
  • Basic getting around the Linux file system

What am I going to get from this course?

  • Configure Linux Securely
  • Understand and implement Selinux
  • Configure centralized logging with rsyslog securely
  • Configure auditing and view reports to understand events on a system
  • Better understand implement auditing checks
  • Configure authentication using PAM
  • Implement password policies
  • Configure firewall policies using firewalld

What is the target audience?

  • System Administrators working in an environment where Security is a concern
  • Auditors looking to learn more about Linux to better understand their auditing practice
  • Incident Responders wanting to understand the Linux Operating System better
  • Security Professionals who want to know how Linux implements security
  • If you are new to Linux, this course will not teach you the basics of Linux system administration. You would be better served taking some of the other courses on Udemy and then circling back to this course after a few weeks. You should have a good understanding of configuring a Linux system and getting around the command prompt before taking this course

What you get with this course?

Not for you? No problem.
30 day money back guarantee.

Forever yours.
Lifetime access.

Learn on the go.
Desktop, iOS and Android.

Get rewarded.
Certificate of completion.

Curriculum

Section 1: Optional: Using AWS for Creating Virtual Linux Instances
12:41

This is a demo of how the AWS scripts can help you create Red Hat instances that will allow you to learn in a Linux environment that you don't mind messing up!

AWS setup process for Windows
12:41
AWS scripts
Article
AWScreate setup for Windows Operating Systems
07:34
Setup AWS create on Linux and OS X
Article
AWS configuration for all Operating Systems
04:17
Section 2: User Management
Authentication Intro
Preview
00:53
Authentication Basics Demo
06:44
User Management Demo
08:33
Section 3: Linux Permissions
Permissions Introduction
14:18
Permissions Access Controls
06:37
File Attributes
Preview
10:18
Umask
02:09
Section 4: Authentication-PAM
Simple Password Policies
01:38
Simple Password Polices Demo
Preview
03:29
PAM
09:11
PAM Demo
Preview
14:42
Section 5: Privilege Management-Sudo
Sudo Introduction
06:58
Sudoers Demo
06:54
Sudo Caution
06:14
Section 6: Linux Firewall-Firewalld
Firewall Introduction
04:32
Firewall Zones
02:56
Firewall Rules
09:24
Section 7: Local Attacks
Local Security Introduction
03:16
Bootloader Security - Grub
02:15
Grub Password Demo
03:29
Section 8: Linux Logging-Rsyslogd
Rsyslog Introduction
05:06
Rsyslog Demo
04:20
Rsyslog Remote Server
02:22
Rsyslog Server Demo
10:44
Rsyslog Client Demo
05:17
Section 9: Linux Auditing-Auditd
Auditd Introduction
11:17
Auditd Demo
09:44
Auditd Reporting
03:30
Auditd Reporting Demo
04:34
Section 10: Selinux
Selinux Introduction
Preview
10:20
Selinux Demo
09:28
Selinux Rules
18:24
Selinux Booleans
06:50
Selinux Audit2Allow
08:25

Students Who Viewed This Course Also Viewed

  • Loading
  • Loading
  • Loading

Instructor Biography

Daniel Lohin, IT Security Nerd

I am passionate about Information Technology. I am fascinated by the Information Security field as a whole. I have spent most of my time in security from a systems and security engineering background where I am hands on implementing individual solutions for customers to increase the security on their networks.

I have worked heavily with Unix and Linux administration. I have also worked with VMware Infrastructure. I have had other short development roles that make me a well rounded person such as Python and C# development and help me understand development better.


I teach part time as an adjunct professor. This role fits me because I love to teach information security to other people and spread my passion to other students.


I currently hold an M.S in Information Security and Assurance as well as certificates in CISSP, ITIL, Security+, CEH and ECSA.

Ready to start learning?
Take This Course