| Introduction | |||
| Complete Guide to Linux Security – Introduction | 00:02:00 | ||
| Course overview | 00:04:00 | ||
| Lab Setup | |||
| Download and Install VirtualBox | 00:06:00 | ||
| Creating First Virtual Machine | 00:06:00 | ||
| Linux Installation | 00:25:00 | ||
| Linux CentOS8 Installation | 00:25:00 | ||
| Linux Security | |||
| What is Security and OS Hardening? | 00:04:00 | ||
| Securing All OS | 00:03:00 | ||
| Importance of Linux Security | 00:06:00 | ||
| Type of Security Breach | 00:04:00 | ||
| Change Password Parameters | 00:08:00 | ||
| Creating User Account and Changing Password | 00:09:00 | ||
| Set Password Policy | 00:12:00 | ||
| Disable SSH Access for a Specific User | 00:06:00 | ||
| Lock or Disable User Accounts Manually | 00:07:00 | ||
| Lock or Disable User Accounts | 00:07:00 | ||
| Lock User Account After 3 Failed Attempts | 00:09:00 | ||
| Restrict Direct “root” Login | 00:08:00 | ||
| Linux File Ownership and Permissions | 00:04:00 | ||
| Change File Permissions – LAB | 00:12:00 | ||
| Change File Ownership – LAB | 00:12:00 | ||
| Change SSH Port | 00:09:00 | ||
| Message of the Day (motd) | 00:08:00 | ||
| One Service Per Server | 00:05:00 | ||