Find online courses made by experts from around the world.
Take your courses with you and learn anywhere, anytime.
Learn and practice real-world skills and achieve your goals.
Are you interested in learning more about Linux Security? Then this is course for you! This course will teach you how to better secure a Linux system as well as understand how various Linux security controls work to increase security and meet compliance with various regulations. You will learn fundamentals of security such as users, permissions as well as more advanced topics like Selinux, auditing and PAM. You will also learn how to set up various services such as Rsyslog.
This course is a mix of lecture and demos to help you understand the concepts. To succeed in this course you should have a basic understanding of Linux System administration to include things like setting up networking, editing files and basic file management. This course focuses on Centos and Red Hat Linux, but some of the concepts would apply to other distributions as well. I would recommend you have access to a Centos or Red Hat system so you can follow along with some of the demos. Access can be provided by Amazon AWS and you can use the free tier if desired.
I am not affiliated in any way with either Red Hat or Centos.
Not for you? No problem.
30 day money back guarantee.
Learn on the go.
Desktop, iOS and Android.
Certificate of completion.
|Section 1: Optional: Using AWS for Creating Virtual Linux Instances|
This is a demo of how the AWS scripts can help you create Red Hat instances that will allow you to learn in a Linux environment that you don't mind messing up!
AWS setup process for Windows
AWScreate setup for Windows Operating Systems
Setup AWS create on Linux and OS X
AWS configuration for all Operating Systems
|Section 2: User Management|
Authentication Basics Demo
User Management Demo
|Section 3: Linux Permissions|
Permissions Access Controls
|Section 4: Authentication-PAM|
Simple Password Policies
Simple Password Polices DemoPreview
|Section 5: Privilege Management-Sudo|
|Section 6: Linux Firewall-Firewalld|
|Section 7: Local Attacks|
Local Security Introduction
Bootloader Security - Grub
Grub Password Demo
|Section 8: Linux Logging-Rsyslogd|
Rsyslog Remote Server
Rsyslog Server Demo
Rsyslog Client Demo
|Section 9: Linux Auditing-Auditd|
Auditd Reporting Demo
|Section 10: Selinux|
I am passionate about Information Technology. I am fascinated by the Information Security field as a whole. I have spent most of my time in security from a systems and security engineering background where I am hands on implementing individual solutions for customers to increase the security on their networks.
I have worked heavily with Unix and Linux administration. I have also worked with VMware Infrastructure. I have had other short development roles that make me a well rounded person such as Python and C# development and help me understand development better.
I teach part time as an adjunct professor. This role fits me because I love to teach information security to other people and spread my passion to other students.
I currently hold an M.S in Information Security and Assurance as well as certificates in CISSP, ITIL, Security+, CEH and ECSA.