Books & Videos

Table of Contents

Chapter: Introduction

Linux Security: Introduction

03m 30s

Getting Started: Setting up a lab environment

03m 11s

Chapter: Module 1: Linux Operating System Security


00m 28s

Chapter: Lesson 1: Keeping Linux up-to-date

Learning objectives

00m 26s

1.1 Developing an update strategy

03m 40s

1.2 Applying security updates on Red Hat

02m 56s

1.3 Applying security updates on Ubuntu

03m 7s

1.4 Validating packages

02m 31s

Lesson 1 Lab

00m 30s

Lesson 1 Lab Solution

03m 23s

Chapter: Lesson 2: Managing file system security properties

Learning objectives

00m 40s

2.1 Creating encrypted volumes—Part 1

08m 59s

2.2 Creating encrypted volumes—Part 2

06m 32s

2.3 Using security related mount options

05m 15s

2.4 Monitoring file system changes (AIDE)

07m 46s

Lesson 2 Lab

00m 24s

Lesson 2 Lab Solution

04m 24s

Chapter: Lesson 3: Securing server access

Learning objectives

00m 31s

3.1 Securing the GRUB boot loader

10m 17s

3.2 Modifying text console settings

04m 26s

3.3 Modifying graphical console settings

02m 42s

Lesson 3 Lab

00m 19s

Lesson 3 Lab Solution

02m 3s

Chapter: Lesson 4: Configuring system logging

Learning objectives

00m 31s

4.1 Understanding Linux logging

07m 41s

4.2 Configuring secure remote logging: Creating the CA

08m 44s

4.3 Configuring secure remote logging: Configuring the key material

05m 32s

4.4 Configuring secure remote logging: Setting up the log server

06m 2s

4.5 Configuring secure remote logging: Setting up log filtering

08m 13s

4.6 Managing log rotation

04m 17s

4.7 Making journald logs persistent

04m 24s

4.8 Using Logwatch for log analysis

04m 36s

Lesson 4 Lab

00m 27s

Lesson 4 Lab Solution

03m 8s

Chapter: Lesson 5: Managing system auditing

Learning objectives

00m 46s

5.1 Reading the audit log

07m 19s

5.2 Configuring auditing

04m 54s

5.3 Audit reporting

05m 54s

5.4 Writing custom audit rules

08m 36s

5.5 Using predefined audit sets

06m 6s

Lesson 5 Lab

00m 30s

Lesson 5 Lab Solution

06m 55s

Chapter: Lesson 6: Managing mandatory access control (MAC)

Learning objectives

00m 38s

6.1 Understanding the need for MAC

05m 15s

6.2 Comparing SELinux to AppArmor

02m 40s

6.3 Configuring AppArmor

16m 16s

6.4 Understanding SELinux workings

05m 35s

6.5 Configuring SELinux file context

14m 28s

6.6 Configuring SELinux port context

05m 47s

6.7 Analyzing SELinux events

08m 7s

6.8 Writing custom SELinux modules

09m 40s

6.9 Managing users in SELinux

03m 24s

6.10 Other MAC solutions (Smack)

01m 37s

Lesson 6 Lab

00m 21s

Lesson 6 Lab Solution

18m 53s

Chapter: Lesson 7: Managing kernel security

Learning objectives

00m 39s

7.1 Understanding kernel security architecture

04m 25s

7.2 Linux kernel security issues

04m 11s

7.3 Fixing Linux kernel vulnerabilities

04m 27s

Lesson 7 Lab

01m 52s

Lesson 7 Lab Solution

01m 34s

Chapter: Module 2: Managing Linux User Security‚Äã


00m 33s

Chapter: Lesson 8: Managing Linux permissions and attributes

Learning objectives

00m 37s

8.1 Summarizing basic permission usage

06m 15s

8.2 Managing special permissions

10m 12s

8.3 Finding files with special permissions

02m 32s

8.4 Managing default permissions

05m 21s

8.5 Managing access control lists

08m 52s

8.6 Using extended attributes

07m 39s

Lesson 8 Lab

01m 5s

Lesson 8 Lab Solution

02m 11s

Chapter: Lesson 9: Managing user accounts

Learning objectives

00m 39s

9.1 Managing password properties

06m 54s

9.2 Auditing user accounts

02m 19s

9.3 Understanding PAM Part 1

10m 7s

9.4 Understanding PAM Part 2

04m 51s

9.5 Understanding security related PAM options

03m 41s

9.6 Configuring PAM

05m 6s

9.7 Applying account lockout with PAM Tally

03m 58s

9.8 Configuring sudo

08m 45s

Lesson 9 Lab

00m 42s

Lesson 9 Lab Solution

03m 58s

Chapter: Lesson 10: Installing central authentication

Learning objectives

01m 3s

10.1 Understanding LDAP

04m 17s

10.2 Understanding Kerberos

03m 37s

10.3 Installing FreeIPA server

12m 44s

10.4 Installing FreeIPA clients

03m 18s

10.5 Understanding the role of sssd

06m 48s

10.6 Managing users and groups on FreeIPA

03m 58s

10.7 Setting policies on FreeIPA

03m 28s

10.8 Configuring centralized sudo rules

05m 16s

Lesson 10 Lab

00m 43s

Lesson 10 Lab Solution

15m 33s

Chapter: Module 3: Securing Linux Services


00m 44s

Chapter: Lesson 11: Securing services

Learning objectives

00m 33s

11.1 Understanding DNS security issues

06m 42s

11.2 Securing DNS

14m 9s

11.3 Securing Apache

11m 4s

11.4 Securing e-mail

13m 59s

11.5 Securing SSH

13m 4s

11.6 Securing vsftpd

04m 12s

Lesson 11 Lab

00m 19s

Lesson 11 Lab Solution

05m 23s

Chapter: Lesson 12: Securing network file systems

Learning objectives

00m 33s

12.1 Understanding NFSv4 security improvements

05m 10s

12.2 Configuring NFSv4 server and clients

04m 48s

12.3 Understanding NFSv4 authentication mechanisms

06m 9s

12.4 Using NFSv4 pseudo file systems

01m 35s

12.5 Understanding NFSv4 ACLS

04m 16s

12.6 Understanding and using CIFS UNIX extensions

03m 52s

12.7 Understanding and configuring CIFS security modes (NTLM, Kerberos)

02m 41s

12.8 Managing, mapping and handling of CIFS, ACLs and SIDs

03m 30s

Lesson 12 Lab

00m 21s

Lesson 12 Lab Solution

06m 54s

Chapter: Lesson 13: Applying secure remote access solutions

Learning objectives

00m 40s

13.1 Configuring FreeRADIUS to authenticate network nodes

05m 42s

13.2 Identifying and dealing with rogue router advertisements and DHCP

03m 1s

13.3 Configuring and operating OpenVPN server and clients

17m 8s

13.4 Configuring and operating IPsec server and clients

05m 58s

Lesson 13 Lab

00m 19s

Lesson 13 Lab Solution

13m 17s

Chapter: Module 4: Securing Linux Infrastructure


00m 51s

Chapter: Lesson 14: Sniffing and port scanning

Learning objectives

00m 43s

14.1 Understanding network sniffing

03m 57s

14.2 Using tcpdump and Wireshark for package capture

12m 12s

14.3 Introducing nmap

09m 3s

14.4 Understanding Nessus

02m 57s

14.5 Using tripwire

02m 10s

Lesson 14 Lab

00m 23s

Lesson 14 Lab Solution

03m 6s

Chapter: Lesson 15: Configuring analyzing and intrusion detection tools

Learning objectives

00m 39s

15.1 Introducing Snort

01m 54s

15.2 Performing a base Snort configuration

04m 35s

15.3 Understanding Snort output

01m 34s

15.4 Introducing Nagios

05m 36s

15.5 Using ntop

02m 36s

15.6 Using John the Ripper

06m 35s

15.7 Introducing Puppet

03m 44s

Lesson 15 Lab

00m 20s

Lesson 15 Lab Solution

04m 0s

Chapter: Lesson 16: Managing firewalls

Learning objectives

00m 46s

16.1 Understanding IPtables basics

13m 2s

16.2 Advanced IPtables usage

07m 51s

16.3 Working with firewalld

09m 26s

16.4 Working with ufw

04m 11s

Lesson 16 Lab

00m 36s

Lesson 16 Lab Solution

05m 53s

Chapter: Lesson 17: Managing certificates and public key infrastructures

Learning objectives

00m 48s

17.1 Understand x.509 certificates and their properties

11m 3s

17.2 Understanding trust chains and public key infrastructures

07m 54s

17.3 Generating and managing public and private keys

02m 19s

17.4 Creating, operating, and securing a certification authority

04m 44s

17.5 Request, sign, and manage server and client certificates

04m 4s

17.6 Revoke certificates and certification authorities

02m 19s

17.7 Using openssl for SSL/TLS client and server tests

01m 44s

17.8 Using the openssl commnad for testing TLS certificates

06m 2s

Lesson 17 Lab

00m 18s

Lesson 17 Lab Solution

07m 54s

Chapter: Lesson 18: Managing GPG

Learning objectives

00m 24s

18.1 Performing Basic GnuPG configuration, usage, and key revocation

07m 6s

18.2 Using GnuPG in e-mail

04m 34s

18.3 Using GnuPG to encrypt files

03m 35s

Lesson 18 Lab

00m 20s

Lesson 18 Lab Solution

04m 49s

Chapter: Summary

Linux Security: Summary

00m 42s