Last updated 11/2021
MP4 | Video: h264, 1280×720 | Audio: AAC, 44.1 KHz
Language: English | Size: 3.73 GB | Duration: 16h 18m
The Best Linux Security Course that prepare you to protects your Systems from attacks by hackers. Helps in RHCSA & RHCE
What you’ll learn
By the end of this course you will be able to apply most of the security measures in your Linux environment
You will be able to pass the Redhat Certified Engineer exam (EX300)
You will reduce the risk of your Linux system being hacked or attacked
You will have expert knowledge of Linux account and system securities
Requirements
Basic understanding of Linux. My suggestion is to take my "Complete Linux Training Course to Get Your Dream IT Job"
You will need a Linux machine but if you have a Windows computer then you can install VirtualBox and install Linux (The instruction are covered in this course)
Description
If you have basic understanding of Linux and want to enhance your skill in Linux security and system hardening then this course is perfect fit for you. Many security policies and standards require system administrators to address specific user authentication concerns, application of updates, system auditing and logging, file system integrity, and more. This course provides strategies for addressing specific policy and configuration concerns.This course is intended to develop the skills needed to ensure data integrity on computer systems for organizations with high security standards. I have 35,000+ students on Udemy platform and many of them are able to secure their dream job in IT field just by taking my courses. I always start with basic and then dive into advance levelThis course is best for someone who:wants to learn almost everything about Linux securitywants to step-up in his/her careeris looking for a job in Linuxneeds technical guidance on how to enhance the security of Linux systemsis responsible for implementing security policy requirements on Linux systems consistently and in a reproducible waymust be able to demonstrate that Linux systems meet security policy requirementsmaintains continued adherence to security requirements, including management of security-critical operating system/software updates===Overview of the course:There are total of 10 sections in this courseSection 1 – Introduction and Course OverviewCourse OverviewDownload SyllabusSection 2 – Security ConceptsWhat is Security and OS Hardening?Comparing House Security with Computer SecuritySecuring All Operating SystemsImportance of Linux SecuritySecurity Implementation ToolsType of Security BreachQuiz, Handouts and HomeworkSection 3 – Lab Setup (optional)What is VirtualBox?Installing Oracle VirtualBoxCreating First Virtual MachineLinux InstallationSection 4 – Securing User EnvironmentUnderstanding /etc/passwd, /etc/group and /etc/shadowThe /etc/login.def FileCreate User Account and Change PasswordChange Password ParametersSet Password PolicyLock or Disable User Accounts AutomaticallyLock or Disable User Accounts ManuallyLock User Account After 3 Failed AttemptsRestrict root LoginDisable SSH Access for a Specific UserImplement UID/GID PolicyCentralized Authentication Servicesudo AccessMonitor User ActivitySection 5 – PAM (Pluggable Authentication Module)What is PAM?The Importance of PAMThe PAM Configuration Files FormatPAM Config File – Module InterfacesAccount Access Through PAMPAM Config File – Control FlagsPAM Config File – Modules (SO)PAM Aware Services and StacksSection 6 – Securing Linux FilesystemLinux File TypesLinux File AttributesLinux File Ownership and PermissionsChanging File PermissionChanging File OwnershipAccess Control List (ACL)Section 7 – Securing Linux SystemMessage of the Day and customizing message of the dayPhysical Server SecurityRemove Unnecessary or Orphan PackagesKeep Kernel and System Up to DateStop and Disable Unwanted ServicesSeparate Disk PartitionsDisable Ctrl+Alt+DeleteRunning One Service per SystemChange Default Console PasswordsDisable USB Stick DetectionEnable Network Time Protocol (NTP or Chronyd)Lockdown CronjobsChange SSH PortsSELinux (longest lecture and lab)BackupsSection 8 – Securing Linux System NetworkIntroduction to Firewalliptables (tables, chains and targets)iptables (practical examples)Firewall (firewalld)firewalld (Practical Examples)firewalld (GUI)Encrypt Incoming and Outgoing TrafficSSH vs. TelnetTurn Off IPV6 (If not in use)Section 9 – Securing Environment Around LinuxHardware/Network FirewallNetwork Address Translation (NAT)VPN TunnelApplication and Database EncryptionSection 10 – Additional ResourcesMany more lectures on Linux…===Here is the testimonial from my students:To all of you that are looking for a REALLY GOOD LINUX course, THIS IS IT, SERIOUSLY I promise you won’t find a course on LINUX here that is THIS GOOD. — T.J. Marstiller (Udemy Student)Imran is a very knowledgeable and engaging instructor. As others have said, you can tell that he is not just trying to sell a course, but that he is invested in giving his students a strong career foundation with a positive and approachable attitude. He is also entertaining with his use of pop culture and practical work examples. It really feels like you’re in a classroom with him. I’m taking this course mainly as a hobbyist, but got a lot from it already. The homework assignments, quizzes, and handouts help reinforce the material. — Raymond B. (Udemy Student)Main thing about course is its simplicity and the hierarchy. Design is very good and easy which helps to understand things better. — Akash Garg (Udemy Student)I just love the teaching ad the learning experience I am getting — Jacob Samba (Udemy Student)Imran Afzal might be my favorite teacher I’ve EVER had. He is funny, and engaging. The course was easy to follow, and with no experience starting I am now extremely comfortable with Linux, and actually really like it. He does make you do your googles, but this is not a bad thing especially considering the nature of IT and documentation to solve your own problems. I highly recommend. — Vanessa Diaz-Goumond (Udemy Student)The course is run very well and I really like the handouts and the homework that is assigned. The homework helps me learn and continue with the learning process even when adult life is still progressing forward. — Thomas Rogers (Udemy Student)Such an amazing instructor. Imran must have put in a lot of effort in structuring the course and taking the student step by step, he takes his time in explaining everything, from what Linux is, how to down load it, coding, etc. I have taken other courses from Imran. I am a student for life. Keep it up and please keep preparing more courses for please like us who can benefit from your way of teaching, knowledge and experience. Thank you. — Ali Shiekh (Udemy Student)In the first place I say a big thank you to the instructor for making such a great course. I was afraid to learn Linux. I now feel very comfortable with Linux. I have understood both the concept behind and the practical as well. I would recommend every one who is NEW to Linux and wants to grab it once and for all without wasting time to go ahead and ENROLL. You will not regret it. I would like the instructor to do same for WINDOWS SERVER ADMIN., I don’t seem to find any better and beginner oriented course out there that could be matched with this course. To me, it is the BEST Linux Course on Online. I just started some real world projects with Linux after this great course, I was new to Linux and in just a month I am on the command line always playing. — Opoku Bright (Udemy Student)I genuinely look forward to additional courses in the future. This has been so informative. You hear the name oracle all the time, but this was well put in layman’s terms — Atoofa Hasan (Classroom Student)Imran Afzal eats, breathes and sleeps Linux! He really knows his stuff. I feel like he has brought me from a novice level education to masters level in a short time period. Anyone who is looking to get a job in Linux should definitely take this course. — TJ Walker (Udemy Student)
Overview
Section 1: Introduction and Course Overview
Lecture 1 Introduction
Lecture 2 Syllabus Overiew
Lecture 3 Download Syllabus
Lecture 4 Thank You
Section 2: Security Concepts
Lecture 5 Welcome to Security Concepts
Lecture 6 What is Security and OS Hardening?
Lecture 7 Comparing House Security with Computer Security
Lecture 8 Securing All Operating Systems
Lecture 9 Importance of Linux Security
Lecture 10 Security Implementation Tools
Lecture 11 Type of Security Breach
Lecture 12 Handouts
Lecture 13 Homework
Section 3: Lab Setup
Lecture 14 Welcome to Lab Setup
Lecture 15 What is Oracle VirtualBox?
Lecture 16 Downloading and Installing Oracle VirtualBox
Lecture 17 Creating First Virtual Machine
Lecture 18 Linux CentOS7 Installation (Recommended)
Lecture 19 Linux CentOS8 Installation (Optional)
Lecture 20 Handouts
Lecture 21 Homework
Section 4: Securing User Environment
Lecture 22 Welcome to Securing User Environment
Lecture 23 Understanding /etc/passwd
Lecture 24 Understanding /etc/group
Lecture 25 Understanding /etc/shadow
Lecture 26 The /etc/login.defs File
Lecture 27 Create User Account and Change Password
Lecture 28 Change Password Parameters
Lecture 29 Set Password Policy
Lecture 30 Lock or Disable User Accounts
Lecture 31 Lock or Disable User Accounts Manually
Lecture 32 Lock User Account After 3 Failed Attempts
Lecture 33 Restrict root Login
Lecture 34 Disable SSH Access for a Specific User
Lecture 35 Limiting User Account Resources (ulimit)
Lecture 36 Implement UID/GID Policy
Lecture 37 Centralized Authentication Service
Lecture 38 sudo Access
Lecture 39 Monitor User Activity
Lecture 40 Homework
Lecture 41 Handouts
Section 5: PAM (Pluggable Authentication Module)
Lecture 42 Welcome to PAM
Lecture 43 What is PAM?
Lecture 44 The Importance of PAM
Lecture 45 The PAM Configuration Files Format
Lecture 46 PAM Config File – Module Interfaces
Lecture 47 Account Access Through PAM
Lecture 48 PAM Config File – Control Flags
Lecture 49 PAM Config File – Modules (SO)
Lecture 50 PAM Aware Services and Stacks
Lecture 51 Handouts
Lecture 52 Homework
Section 6: Securing Linux Filesystem
Lecture 53 Welcome to Securing Linux Filesystem
Lecture 54 Linux File Types
Lecture 55 Linux File Attributes
Lecture 56 Linux File Ownership and Permissions
Lecture 57 Changing File Permission – LAB
Lecture 58 Changing FIle Ownership – LAB
Lecture 59 Access Control List (ACL)
Lecture 60 Handouts
Lecture 61 Homework
Section 7: Securing Linux System
Lecture 62 Welcome to Securing Linux System
Lecture 63 Message of the Day
Lecture 64 Customize Message of the Day
Lecture 65 Physical Server Security
Lecture 66 Remove Un-necessary or Orphan Packages
Lecture 67 Keep Kernel and System Up to Date
Lecture 68 Stop and Disable Unwanted Services
Lecture 69 Separate Disk Partitions
Lecture 70 Disable Ctrl+Alt+Delete
Lecture 71 Running One Service per System
Lecture 72 Change Default Console Passwords (Only Physical)
Lecture 73 Disable USB Stick Detection
Lecture 74 Enable an Network Time Protocol (NTP or Chronyd)
Lecture 75 Lockdown Cronjobs
Lecture 76 Change SSH Port
Lecture 77 SELinux
Lecture 78 Backups
Lecture 79 Handouts
Lecture 80 Homework
Section 8: Securing Linux System Network
Lecture 81 Welcome to Securing Linux Network
Lecture 82 Introduction to Firewall
Lecture 83 Firewall (iptables – tables, chains and targets)
Lecture 84 Firewall (iptables – practical examples)
Lecture 85 Firewall (firewalld)
Lecture 86 Firewall (firewalld – Practical Examples)
Lecture 87 Firewall (firewalld GUI)
Lecture 88 Encrypt Incoming and Outgoing Traffic
Lecture 89 SSH vs. Telnet
Lecture 90 Turn Off IPV6 (If not in use)
Lecture 91 Handouts
Lecture 92 Homework
Section 9: Securing Environment Around Linux
Lecture 93 Welcome to Securing Environment Around Linux
Lecture 94 Hardware/Network Firewall
Lecture 95 Network Address Translation (NAT)
Lecture 96 VPN Tunnel
Lecture 97 Application and Database Encryption
Lecture 98 Types of Security Threats
Lecture 99 Handouts
Lecture 100 Homework
Lecture 101 Congratulations
Section 10: Additional Resources
Lecture 102 Welcome to Additional Resources
Lecture 103 Getting Linux Commands Help
Lecture 104 Compress and Uncompress Files
Lecture 105 Absolute and Relative Path
Lecture 106 Changing Password
Lecture 107 sed Command Examples
Lecture 108 Talking to Users
Lecture 109 Wildcards
Lecture 110 Hard and Soft Link
Lecture 111 User Directory Authentication
Lecture 112 Difference AD, openLDAP, WinBind etc.
Lecture 113 Open LDAP
Lecture 114 System Log Monitor
Lecture 115 Recover Root Password
Lecture 116 File Transfer Commands
Lecture 117 NIC Bonding
Lecture 118 Advance Package Management
Lecture 119 File System Check
Lecture 120 Compress and uncompress
Lecture 121 File Maintenace Commands
Lecture 122 File Ownership Commands
Lecture 123 Environment Variable
Lecture 124 Linux File Editor – vi
Lecture 125 Process Management
Lecture 126 User Account Management
Lecture 127 Create Local Yum Repo
Lecture 128 Securing Linux Machine – Quick Recap
Section 11: Bonus Section
Lecture 129 Welcome to Bonus Section
Lecture 130 Bonus Lecture
Anyone who wants to have complete understanding Linux security and OS hardening,Anyone who wants to advance his/her career,Anyone who wants to pass the RHCE EX300 exam
Homepage
https://www.udemy.com/course/complete-linux-security-hardening-with-practical-examples/
DOWNLOAD FROM RAPIDGATOR.NET
DOWNLOAD FROM RAPIDGATOR.NET
DOWNLOAD FROM RAPIDGATOR.NET
DOWNLOAD FROM RAPIDGATOR.NET
DOWNLOAD FROM UPLOADGIG.COM
DOWNLOAD FROM UPLOADGIG.COM
DOWNLOAD FROM UPLOADGIG.COM
DOWNLOAD FROM UPLOADGIG.COM
DOWNLOAD FROM NITROFLARE.COM
DOWNLOAD FROM NITROFLARE.COM
DOWNLOAD FROM NITROFLARE.COM
DOWNLOAD FROM NITROFLARE.COM