Course Highlights
Gain the skills and credentials to kickstart a successful career and learn from the experts with this step-by-step training course. This Ultimate Linux Security and Hardening Training has been specially designed to help learners gain a good command of Ultimate Linux Security and Hardening Training, providing them with a solid foundation of knowledge to become a qualified professional.
Through this Ultimate Linux Security and Hardening Training, you will gain both practical and theoretical understanding of Ultimate Linux Security and Hardening Training that will increase your employability in this field, help you stand out from the competition and boost your earning potential in no time.
Not only that, but this training includes up-to-date knowledge and techniques that will ensure you have the most in-demand skills to rise to the top of the industry. This qualification is fully accredited, broken down into several manageable modules, ideal for aspiring professionals.
Learning outcome
- Familiar yourself with the recent development and updates of the relevant industry
- Know how to use your theoretical knowledge to adapt in any working environment
- Get help from our expert tutors anytime you need
- Access to course contents that are designed and prepared by industry professionals
- Study at your convenient time and from wherever you want
Course media
Why should I take this course?
- Affordable premium-quality E-learning content, you can learn at your own pace.
- You will receive a completion certificate upon completing the course.
- Internationally recognized Accredited Qualification will boost up your resume.
- You will learn the researched and proven approach adopted by successful people to transform their careers.
- You will be able to incorporate various techniques successfully and understand your customers better.
Requirements
- No formal qualifications required, anyone from any academic background can take this course.
- Access to a computer or digital device with internet connectivity.
Course Curriculum
-
Course Overview
00:01:00
-
Section Overview – General Security
00:01:00
-
Is Linux Secure?
00:02:00
-
What Makes Linux Secure?
00:08:00
-
Security Guidelines and Principles
00:08:00
-
Section Summary – General Security
00:02:00
-
Section Overview – Physical Security
00:01:00
-
Physical Security Concepts
00:08:00
-
Single User Mode Security
00:07:00
-
Single User Mode and Blank Passwords
00:03:00
-
Securing the Boot Loader
00:07:00
-
Disk Encryption
00:06:00
-
Encrypting a New Device, Part I
00:09:00
-
Encrypting a New Device, Part II
00:04:00
-
Encrypting an Existing Device
00:01:00
-
Disabling Control Alt Delete
00:02:00
-
Section Summary – Physical Security
00:01:00
-
Section Overview – Account Security
00:01:00
-
Intro to PAM
00:05:00
-
PAM Configuration Example
00:04:00
-
Password Security
00:08:00
-
Account Security Demo #1 (UID 0)
00:03:00
-
Security by Account Type
00:06:00
-
Controlling Account Access
00:05:00
-
Account Security Demo #2
00:03:00
-
Account Security Demo #3 (Sudo)
00:05:00
-
Section Overview – Network Security
00:01:00
-
Network Security, Part I
00:08:00
-
Network Security, Part II
00:06:00
-
Securing SSHD, Part II
00:03:00
-
Securing SSHD, Part II
00:03:00
-
Linux Firewall Fundamentals
00:08:00
-
Firewall Rule Specifications
00:05:00
-
Configuring the Firewall from the Command Line
00:04:00
-
Example Firewall Rules
00:04:00
-
Linux Firewall Demonstration
00:10:00
-
TCP Wrappers, Part I
00:07:00
-
TCP Wrappers, Part II
00:04:00
-
Section Overview – File System Security
00:01:00
-
File and Directory Permissions, Intro
00:01:00
-
File and Directory Permissions, Part I
00:11:00
-
File and Directory Permissions, Part II
00:09:00
-
Special Modes, Part I
00:08:00
-
Special Modes, Part II
00:03:00
-
File Attributes
00:06:00
-
File Attributes Demo
00:03:00
-
ACLs
00:09:00
-
ACLs Demo
00:06:00
-
Rootkits
00:09:00
-
Rootkit Hunter Demonstration
00:07:00
-
Additional Resources
00:05:00
Offer Ends in

-
Duration:4 hours, 12 minutes
-
Access:1 Year
-
Units:51

