Linux Security and Hardening, The Practical Security Guide.
4.4 (653 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
8,174 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Linux Security and Hardening, The Practical Security Guide. to your Wishlist.

Add to Wishlist

Linux Security and Hardening, The Practical Security Guide.

Secure any Linux server from hackers & protect it against hacking. The practical Linux Administration security guide.
Bestselling
4.4 (653 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
8,174 students enrolled
Created by Jason Cannon
Last updated 6/2017
English
English, ...
  • English
  • Afrikaans
Current price: $10 Original price: $195 Discount: 95% off
1 day left at this price!
30-Day Money-Back Guarantee
Includes:
  • 4.5 hours on-demand video
  • 3 Articles
  • 5 Supplemental Resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • By the end of this course you will be able to harden a Linux system, reduce its surface of vulnerability, and reduce the risk of your Linux system being hacked or compromised.
View Curriculum
Requirements
  • A basic understanding of the Linux operating system. Please consider taking "Learn Linux in 5 Days" before taking this course.
Description

JOIN THE OTHER 40,000 SUCCESSFUL STUDENTS WHO HAVE ALREADY MASTERED THE LINUX OPERATING SYSTEM WITH ONE OF MY TOP RATED COURSES!

Keep yourself and your company out of the news by protecting your Linux systems from hackers, crackers, and attackers!

This course will not only teach you the security concepts and guidelines that will keep your Linux servers safe, it will walk you through hardening measures step-by-step.

Hello. My name is Jason Cannon and I'm the author of Linux Administration, the founder of the Linux Training Academy, and an instructor to thousands of satisfied students. I started my IT career in the late 1990's as a Unix and Linux System Engineer. I've worked for many technology companies who take information security seriously. I've even worked for security firms such as Mandiant and FireEye. I'll be sharing my real-world Linux security experience with you throughout this course.

By the end of this course you will be able to tighten up the security on any Linux system. You'll learn the security weaknesses of the Linux operating system and be given step-by-step instructions on how to protect those weaknesses. You'll even learn some security concepts that apply to information security as a whole while focusing on the Linux specific issues that require special consideration.

What People Are Saying About Jason and his Courses:

"Excellent course on Linux! It is the best way to get started using Linux that I have come across." --Chris Bischoff, Udemy student

"This class was a great review of the 2 Linux classes I took in school. I learned plenty of new stuff and got a great refresher on things I haven't used in some time. I did well on my interview and got the job I was looking for. Thanks!" --Alan Derrick, Udemy student

"This was a great course! Learned a lot from it!" --Ricardo José Crosara Junior, Udemy student

"Excellent starter course. Very good and complete guide to get you started on working on Linux." --Brian Mulder, Udemy student

"Great course! Easy to understand for beginners and a great refresher for experienced users!" --Spencer Ball, Udemy student

"Very well laid out course. Thanks Jason!" --Eric Etheredge, Udemy student

"Love it... it's absolutely one of the best courses I've taken here on Udemy." --Idriss N, Udemy student

"Awesome Course! Another great one. Thanks Jason!" --John Wilmont, Udemy student

"Excellent Course! Having come from a moderate understanding of Linux, this course has given me a deeper and more streamlined understanding of Linux. Definitely worth the money." --Armando Cabrera, Udemy student

"Fantastic course and very beautifully explained." --S John, Udemy student

"Great course, great instructor. I enjoyed every minute of it. I recommend this course 100%." --Alfredo, Udemy student

"I am lovin' it. Nice way to begin one's journey into Linux." --Rohit Gupta, Udemy student

____________________

Here is just some of what you will learn by taking this Linux Security and Hardening course:

  • How to protect your Linux systems against hackers.
  • Ways to prevent attackers from breaking into your systems, even when they have physical access to your machine.
  • How to enforce strong password policies and control password as well as account aging policies on your Linux servers.
  • SSH Hardening practices.
  • Network security tactics.
  • Port scanning and network service detection.
  • How the Linux firewall works and exactly how to configure it.
  • How to protect the superuser (root) account.
  • Ways to share accounts securely with an audit trail.
  • File system security and encryption.
  • Using and configuring sudo, and why you need to.
  • Advanced Linux permissions include special modes, file attributes, and access control lists (ACLs).
  • Much, much more!
  • Unconditional Udemy 30 day money-back guarantee - that's my personal promise of your success!

What you learn in course applies to any Linux environment or distribution including Ubuntu, Debian, Linux Mint, RedHat, CentOS, Fedora, OpenSUSE, Slackware, Kali Linux and more.

____________________

Free Bonus - PDFs of All the Material Covered

As an added bonus for enrolling in this Linux Server Security video training course, you'll receive access to all the slides used in the lessons. You can download them and refer to them when you want to jog your memory or double-check your work.

Enroll now and start learning the skills you need to hack-proof your Linux systems today!

Who is the target audience?
  • Anyone with a desire to learn how to secure and harden a computer running the Linux operating system.
  • Linux system administrators looking to make the systems they support more secure.
  • People thinking about a career as a Linux system administrator or engineer.
  • This course is not for people who have never used the Linux operating system before.
Students Who Viewed This Course Also Viewed
Curriculum For This Course
58 Lectures
04:25:17
+
Course Overview and Downloads
2 Lectures 01:31

A brief overview of what you'll learn in this Linux security course.

Preview 01:25

The course download includes the lecture slides as well as additional information security resources.

Course Downloads
00:06
+
General Security
5 Lectures 21:10
Section Overview
01:09

Is Linux Secure?
02:26

What Makes Linux Secure?
08:18

Security Guidelines and Principles
07:41

Section Summary
01:36

General Security
4 questions
+
Physical Security
11 Lectures 47:25
Section Overview
00:58

Physical Security Concepts
07:41

Single User Mode Security
06:45

Single User Mode and Blank Passwords
03:13

Securing the Boot Loader
07:01

Disk Encryption
05:34

Encrypting a New Device, Part I
08:38

Encrypting a New Device, Part II
04:17

Encrypting an Existing Device
00:52

Disabling Control Alt Delete
01:44

Section Summary
00:42

Physical Security
5 questions
+
Account Security
9 Lectures 39:47
Section Overview
00:45

Intro to PAM
05:13

PAM Configuration Example
04:05

Password Security
07:58

Account Security Demo #1 (UID 0)
03:11

Controlling Account Access
05:06

Security by Account Type
06:02

Account Security Demo #2
02:44

Account Security Demo #3 (Sudo)
04:43

Account Security
10 questions
+
Network Security
12 Lectures 01:07:09
Section Overview
00:35

Network Security, Part I
07:54

Network Security, Part II
06:20

Securing SSHD, Part I
07:52

Securing SSHD, Part II
03:15

Linux Firewall Fundamentals
07:36

Configuring the Firewall from the Command Line
04:04

Firewall Rule Specifications
04:43

Example Firewall Rules
03:59


Linux Firewalls
8 questions

TCP Wrappers, Part I
07:02

TCP Wrappers, Part II
04:02

Network Security
6 questions
+
File System Security
13 Lectures 01:13:39
Section Overview
01:02

File and Directory Permissions, Intro
00:32

File and Directory Permissions, Part I
11:14

File and Directory Permissions, Part II
09:28

Special Modes, Part I
07:56

Special Modes, Part II
03:04

File Attributes
06:06

File Attributes Demo
02:48

ACLs
09:25

ACLs Demo
06:13

Rootkits
08:33

Rootkit Hunter Demonstration
07:12

Rootkit Detection Software
00:06
+
Additional Security Resources
5 Lectures 04:52
Additional Security Resources
04:52

Linux Hardening Guides
1 page

Linux Security Email Lists
1 page

Security Meetups List
5 pages

Security Conference Videos
2 pages
+
Bonus Lecture Section: Get my other courses at the maximum discount!
1 Lecture 00:50
Bonus Lecture: Get my other courses at the maximum discount!
00:50
About the Instructor
Jason Cannon
4.5 Average rating
12,331 Reviews
96,145 Students
13 Courses
Professional system administrator, consultant, and author.

Jason started his career as a Unix and Linux System Engineer in 1999. Since that time he has utilized his Linux skills at companies such as Xerox, UPS, Hewlett-Packard, and Amazon.com. Additionally, he has acted as a technical consultant and independent contractor for small businesses and Fortune 500 companies.

Jason has professional experience with CentOS, RedHat Enterprise Linux, SUSE Linux Enterprise Server, and Ubuntu. He has used several Linux distributions on personal projects including Debian, Slackware, CrunchBang, and others. In addition to Linux, Jason has experience supporting proprietary Unix operating systems including AIX, HP-UX, and Solaris.

He enjoys teaching others how to use and exploit the power of the Linux operating system. He is also the author of the books "Linux for Beginners" and "Command Line Kung Fu."