Practical security

Applying best practice to Linux and windows hardening
4.5 (2 ratings)
Instead of using a simple lifetime average, Udemy calculates a
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
13 students enrolled
Take This Course
  • Lectures 17
  • Length 2.5 hours
  • Skill Level All Levels
  • Languages English
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
Wishlisted Wishlist

How taking a course works


Find online courses made by experts from around the world.


Take your courses with you and learn anywhere, anytime.


Learn and practice real-world skills and achieve your goals.

About This Course

Published 11/2015 English

Course Description

This course is an introduction to how to create a secure base line for your computer systems. We will introduce the best practice advice from the Council on Cyber Security critical security controls.

Going through the "first five", we will describe why they are relevant, how you will be protected when implementing it and show you how to implement it on real systems.

We have structured the course around four main parts, covering the recommendations. An introduction to the idea and the implications of each control is presented, followed by a demonstration showing how to actually implement it on your systems.

The time is takes to work your way through the course, will vary according to your skill level. We aim for 5-10 hours of work - more if you decide to read up on links and other extra material supplied.

You should take this course if you know some IT, but are new to the concept of security, or if you are a seasoned processional, in need of new inspiration and up-to-date information on how to implement security in your company.

Note that we are currently building this course, and we expect it to be finalized ultimo January 2016.

What are the requirements?

  • To get the maximum benefit from the student must have basic knowledge of operating systems and command line usage.
  • Acces to both windows and linux hosts is needed for the hand-on part. This could be either physical or virtual.

What am I going to get from this course?

  • implemented a high level of technical security to both windows and linux systems
  • understand the security mentality needed to create a robust foundation for building secure systems

Who is the target audience?

  • The course is technical and requires the user to know the basics of system administration.
  • We aim for students that are either new to the domain of implementing security on their systems, the technical savvy user who wants a hand-on guide to security, or the seasoned it administrator who wants to broaden his horizont with the current best practice recommandations.

What you get with this course?

Not for you? No problem.
30 day money back guarantee.

Forever yours.
Lifetime access.

Learn on the go.
Desktop, iOS and Android.

Get rewarded.
Certificate of completion.


Section 1: Introduction
What are SANS institute and the first five?
Section 2: Patching
Update on Windows
Update on Ubuntu Desktop
Unattended upgrade on Debian
Wrap up!
Section 3: Limit Admin
Limit administrator rights on Windows
Limit administrator rights on Ubuntu Desktop
Wrap up!
Section 4: Secure image
Cloning discs
Restoring discs
Wrap up!
Section 5: White listing
Wrap up!

Students Who Viewed This Course Also Viewed

  • Loading
  • Loading
  • Loading

Instructor Biography

Morten Nielsen, Ass. lecturer and CEO

I have been working with computers and electronics for decades, and holds a master degree from the Technical University of Denmark. More recently, besides doing consultancy at MN Works, I have been teaching college-level computer science, programming, operating systems and security.

My main focus is to create value for my students by teaching hand-on techniques and useful operational skills. Such skills also require a level of theoretical knowledge, which will be included also.

It is this basic approach to teaching that I bring to my on line courses. For most people, computer systems are tools to be used, and we aim to teach just that.

Instructor Biography

Maria Sjö, Research and Development Engineer at MN Works


My name is Maria and I work as a Research and Development Engineer at MN Works.
My background is IT technology with a PBA in product development and technology integration. I like to help others to expand their understanding of IT and the importance of security in a growing IT world.

In the IT technologist education I have specialized in:
IT security and procedure
Databases and the correlation between interfaces
Network setup
How to reconcile expectations with customers and what you have to remember in this context

In my BA my main focus have been:
How to conduct survey and research
Product development

Ready to start learning?
Take This Course