One-stop solution to all your Linux security problems!
What you'll learn
- Work with the command-line efficiently, learn how to navigate the Linux filesystem, and work with files.
- Protect your Linux Server by securing memory, using security banners, and P.W. management
- Securing your Linux Server with firewalls and SSL encryptions
- Discourage hackers by setting up services such as IP Spoofing Prevention, SSL Security, and more
- Enhance user logins with SSH Keys
- Harden your Linux Server with DDoS Protection, Public Keys, and more
- Prevent intruders from planting malware, and detect whether malware has been planted
- Prevent insiders from accessing data that they aren’t authorized to access
- Do quick checks to see whether a computer is running network services that it doesn’t need to run
- Learn security techniques that are common to all Linux distros, and some that are distro-specific
- Prior knowledge of Linux is mandatory.
Linux is the first choice for any attacker now and more administrators have started moving to the system to create networks or servers for any task. This course will help you create a more secure Linux system.
This comprehensive 3-in-1 course is a step by step guide that will help you to take control of your Linux servers and teach you hands-on techniques which will protect your server from internet attacks—from techniques that hackers use today in order to exploit your server, to hardening your server with some of the most advanced protocols out there. Prevent server exploits such as DDoS Protection, hardening login security protocols, and more! Perform a number of advanced Linux security techniques such as network service detection, user authentication, controlling special permissions, encrypting file systems, and much more!
Contents and Overview
This training program includes 3 complete courses, carefully chosen to give you the most comprehensive training possible.
The first course, Fundamentals of Linux, covers fundamentals of Linux in a step by step manner. This course explains and teaches all the important command-line tools and utilities, using very easy to understand, real-world examples to follow along with—in short, you'll learn everything you really need to know about Linux when starting out from scratch as a new system administrator or for any other reason.
The second course, Linux Server Security, covers securing your Linux server with the help of efficient tools and techniques. You will start by discovering techniques that professional hackers use in order to scan a website and a server, in order to carry out their intrusion attacks. Create secure accounts where we'll look into deleting and creating user accounts password and monitoring servers. Maintain your Linux Server in order to get optimized performance and stability. Moving ahead, you will focus on tools that can be used to enhance server security, understand the art of hardening passwords, and fix authentication failures.
By the end of the course, you will be confident enough to take control of your Linux servers and use hands-on techniques to protect your server from internet attacks.
The third course, Mastering Linux Security and Hardening, covers mastering the art of preventing your Linux system from getting compromised. This course has extensive coverage of techniques that will help prevent attackers from breaching your system, by building a much more secure Linux environment. Learn various security techniques such as SSH hardening, network service detection, and setting up firewalls, encrypting file systems, protecting user accounts, authentication processes, and so on. Moving forward, you will also develop hands-on skills with advanced Linux permissions, access control, special modes, and more. Lastly, this course will also cover best practices and troubleshooting techniques to get your work done efficiently. By the end of this course, you will be confident in delivering a system that will be much harder to compromise.
By the end of the course, you’ll secure your Linux server and protect it from intruders, malware attacks, and other external threats with the help of efficient tools and techniques. About the Authors
- Oliver Pelz has more than 10 years' experience as a software developer and system administrator. He graduated with a diploma degree in bioinformatics and is currently working at the German Cancer Research Center in Heidelberg, where he has authored and co-authored several scientific publications in the field of bioinformatics. He loves coding and riding his mountain bike in the Black Forest of Germany. He develops web applications and biological databases for his department and scientists all over the world and administers a division-wide Linux-based datacenter.
- A certified website master, avid hacktivist, and active journalist, Aubrey started his programming career on a Commodore Vic-20, on which he built his first Hello World app. He has built several websites, mobile apps, and Windows applications. On his journeys, he has been a Linux system administrator, ethical hacker, website master, mobile developer, application creator, and game developer.
- Donald A. Tevault—but you can call him Donnie—got involved with Linux way back in 2006, and has been working with it ever since. He holds the Linux Professional Institute Level 3—Security certification, and the GIAC Incident Handler certification. Donnie is a professional Linux trainer, and thanks to the magic of the internet, teaches Linux classes literally the world over from the comfort of his living room.
- People without any pre-knowledge in Linux or for the absolute Linux beginner. This course is right for everyone wanting to start a job in enterprise Linux system administration. One of the most fundamental features of this course is the comprehensive information it provides.
- Systems administrator or a network engineer interested in making your Linux environment more secure, then this course is for you.
- Security consultants wanting to enhance their Linux security skills will also benefit from this course.
- People who want to be proficient in Linux server security handling, and those who have Linux experience but would like to protect servers from vulnerabilities and attacks and stop them being compromised.