Buying for a Team? Gift This Course
Wishlisted Wishlist

Please confirm that you want to add Practical security to your Wishlist.

Add to Wishlist

Practical security

Applying best practice to Linux and windows hardening
4.5 (2 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
13 students enrolled
Last updated 3/2016
$10 $20 50% off
1 day left at this price!
30-Day Money-Back Guarantee
  • 2 hours on-demand video
  • 17 Supplemental Resources
  • Full lifetime access
  • Access on mobile and TV
Have a coupon?
What Will I Learn?
implemented a high level of technical security to both windows and linux systems
understand the security mentality needed to create a robust foundation for building secure systems
View Curriculum
  • To get the maximum benefit from the student must have basic knowledge of operating systems and command line usage.
  • Acces to both windows and linux hosts is needed for the hand-on part. This could be either physical or virtual.

This course is an introduction to how to create a secure base line for your computer systems. We will introduce the best practice advice from the Council on Cyber Security critical security controls.

Going through the "first five", we will describe why they are relevant, how you will be protected when implementing it and show you how to implement it on real systems.

We have structured the course around four main parts, covering the recommendations. An introduction to the idea and the implications of each control is presented, followed by a demonstration showing how to actually implement it on your systems.

The time is takes to work your way through the course, will vary according to your skill level. We aim for 5-10 hours of work - more if you decide to read up on links and other extra material supplied.

You should take this course if you know some IT, but are new to the concept of security, or if you are a seasoned processional, in need of new inspiration and up-to-date information on how to implement security in your company.

Note that we are currently building this course, and we expect it to be finalized ultimo January 2016.

Who is the target audience?
  • The course is technical and requires the user to know the basics of system administration.
  • We aim for students that are either new to the domain of implementing security on their systems, the technical savvy user who wants a hand-on guide to security, or the seasoned it administrator who wants to broaden his horizont with the current best practice recommandations.
Students Who Viewed This Course Also Viewed
Curriculum For This Course
Expand All 17 Lectures Collapse All 17 Lectures 02:06:08
5 Lectures 31:19

Update on Ubuntu Desktop

Unattended upgrade on Debian

Wrap up!
Limit Admin
4 Lectures 27:37

Limit administrator rights on Windows

Limit administrator rights on Ubuntu Desktop

Wrap up!
Secure image
4 Lectures 26:21

Cloning discs

Restoring discs

Wrap up!
White listing
2 Lectures 22:53

Wrap up!
About the Instructor
4.5 Average rating
2 Reviews
13 Students
1 Course
Ass. lecturer and CEO

I have been working with computers and electronics for decades, and holds a master degree from the Technical University of Denmark. More recently, besides doing consultancy at MN Works, I have been teaching college-level computer science, programming, operating systems and security.

My main focus is to create value for my students by teaching hand-on techniques and useful operational skills. Such skills also require a level of theoretical knowledge, which will be included also.

It is this basic approach to teaching that I bring to my on line courses. For most people, computer systems are tools to be used, and we aim to teach just that.

4.5 Average rating
2 Reviews
13 Students
1 Course
Research and Development Engineer at MN Works


My name is Maria and I work as a Research and Development Engineer at MN Works.
My background is IT technology with a PBA in product development and technology integration. I like to help others to expand their understanding of IT and the importance of security in a growing IT world.

In the IT technologist education I have specialized in:
IT security and procedure
Databases and the correlation between interfaces
Network setup
How to reconcile expectations with customers and what you have to remember in this context

In my BA my main focus have been:
How to conduct survey and research
Product development

Report Abuse