Linux Security and Hardening
Explore the process of beefing up security in all the Linux systems, with this exclusive Linux Security and Hardening course. This course will equip you with a combination of technical skills required to secure your Linux system from hackers and attackers.
By training yourself on how to harden your Linux system, you will have better protection against outside threats. Our comprehensive Linux Security and Hardening training will help you gain a firm grasp of the security guidelines and principles to keep your Linux system secure. It will expose you to the fundamental tools, taking you through physical security concepts, password security, file system security, and Linux firewall fundamentals that you need to ensure the long-term safety of your Linux server.
Enrol now and reach the level of skills required to keep hackers out of your way!
The course is delivered through our online learning platform, accessible through any internet-connected device. There are no formal deadlines or teaching schedules, meaning you are free to study the course at your own pace.
You are taught through a combination of
- Video lessons
- Online study materials
Will I receive a certificate of completion?
Upon successful completion, you will qualify for the UK and internationally-recognised CPD accredited certification. You can choose to make your achievement formal by obtaining your PDF Certificate at the cost of £9 and Hard Copy Certificate for £15.
Why study this course
It doesn’t matter if you are an aspiring professional or absolute beginner; this course will enhance your expertise and boost your CV with critical skills and an accredited certification attesting to your knowledge.
The Linux Security and Hardening is fully available to anyone, and no previous qualifications are needed to enrol. All One Education needs to know is that you are eager to learn and are over 16.
|Unit 01: Course Overview and Downloads|
|Unit 02: General Security|
|Section Overview – General Security||00:01:00|
|Is Linux Secure?||00:02:00|
|What Makes Linux Secure?||00:08:00|
|Security Guidelines and Principles||00:08:00|
|Section Summary – General Security||00:02:00|
|Unit 03: Physical Security|
|Section Overview – Physical Security||00:01:00|
|Physical Security Concepts||00:08:00|
|Single User Mode Security||00:07:00|
|Single User Mode and Blank Passwords||00:03:00|
|Securing the Boot Loader||00:07:00|
|Encrypting a New Device, Part I||00:09:00|
|Encrypting a New Device, Part II||00:04:00|
|Encrypting an Existing Device||00:01:00|
|Disabling Control Alt Delete||00:02:00|
|Section Summary – Physical Security||00:01:00|
|Unit 04: Account Security|
|Section Overview – Account Security||00:01:00|
|Intro to PAM||00:05:00|
|PAM Configuration Example||00:04:00|
|Account Security Demo #1 (UID 0)||00:03:00|
|Controlling Account Access||00:05:00|
|Security by Account Type||00:06:00|
|Account Security Demo #2||00:03:00|
|Account Security Demo #3 (Sudo)||00:05:00|
|Unit 05: Network Security|
|Section Overview – Network Security||00:01:00|
|Network Security, Part I||00:08:00|
|Network Security, Part II||00:06:00|
|Securing SSHD, Part I||00:08:00|
|Securing SSHD, Part II||00:03:00|
|Linux Firewall Fundamentals||00:08:00|
|Configuring the Firewall from the Command Line||00:04:00|
|Firewall Rule Specifications||00:05:00|
|Example Firewall Rules||00:04:00|
|Linux Firewall Demonstration||00:10:00|
|TCP Wrappers, Part I||00:07:00|
|TCP Wrappers, Part II||00:04:00|
|Unit 06: File System Security|
|Section Overview – File System Security||00:01:00|
|File and Directory Permissions, Intro||00:01:00|
|File and Directory Permissions, Part I||00:11:00|
|File and Directory Permissions, Part II||00:09:00|
|Special Modes, Part I||00:08:00|
|Special Modes, Part II||00:03:00|
|File Attributes Demo||00:03:00|
|Rootkit Hunter Demonstration||00:07:00|
|Unit 07: Additional Resources|