Books & Videos

Table of Contents

Chapter: Introduction

Introduction

01m 51s

What Will Be Covered

02m 47s

What Is Linux

03m 50s

Distributions

04m 1s

Scratch Versus Binary

03m 59s

Ubuntu Package Management

03m 18s

RedHat Package Management

04m 40s

Chapter: Booting

The Boot Process

03m 44s

Physical Protections

03m 28s

The Boot Manager - GRUB

05m 56s

Protecting The Boot Manager

04m 2s

xinetd

04m 14s

Runlevels

04m 33s

Setting Default Runlevels

04m 37s

GRUB2

03m 12s

LILO

04m 50s

Chapter: Services

Service Management

02m 53s

Service Management With RHEL7

03m 35s

TCP Wrappers

02m 34s

Listening Ports

05m 41s

Standard Postfix Configuration

06m 5s

Apache Configuration

07m 3s

Hardening Apache

07m 11s

Virtual Hosts In Apache

03m 55s

DNSSec

06m 16s

MySQL

05m 12s

PostgreSQL

04m 0s

Tomcat

05m 34s

JBoss

02m 49s

mod_security

07m 3s

SSL-TLS And Apache

06m 32s

SPF And Greylisting In Postfix

04m 12s

Chapter: Logging And Log Management

Syslog

05m 56s

Remote Logging

03m 51s

Reading Log Files

05m 46s

Logwatch

06m 27s

Log Aggregation

04m 42s

utmp And wtmp

03m 42s

Chapter: Intrusion Detection And Prevention

Anti-Virus

03m 43s

Tripwire

07m 7s

Samhaim

03m 12s

Prelude

03m 37s

AIDE

03m 39s

Snort

07m 5s

Alerting With Snort

05m 15s

Snort Console

03m 54s

Reading Snort Traces With Wireshark

02m 25s

RootKitHunter

03m 35s

Chapter: Users And Permissions

etc-shadow And etc-passwd Files

07m 4s

Creating Users

03m 21s

Securing Passwords

03m 28s

Cracking Passwords

03m 18s

Alternate User Management

03m 10s

AppArmor

03m 5s

Unix Permissions

04m 0s

SELinux

02m 51s

Modifying SELinux Permissions

03m 24s

Restoring SELinux Permissions

02m 38s

PAM

03m 15s

Chapter: Utilities

netstat

03m 58s

Process Management – top And ps

05m 17s

Process Management – kill

04m 7s

nmap

05m 30s

OpenVAS

05m 19s

Nexpose

05m 53s

Find

03m 50s

tcpdump

04m 19s

Wireshark

05m 31s

lspci And lsusb

02m 43s

Chapter: Kernel

Linux Kernel

04m 30s

Kernel Modules

04m 14s

Managing Kernel Parameters

03m 54s

Kernel Builds

05m 10s

Kernel Config

02m 49s

Viewing Kernel Config From Running Kernel

03m 34s

Chapter: Firewalls

iptables

01m 21s

NAT With iptables

04m 36s

iptables Tables

02m 14s

Matching On Protocol

04m 9s

Rate limiting

02m 52s

New Versus Established Versus Related

03m 51s

Targets

02m 19s

iptables Logs

02m 47s

iptables With Multiple Interfaces

02m 56s

Firewalld

02m 55s

Zones And Services

02m 35s

Matching On Owner

03m 6s

ufw

02m 52s

gufw

02m 11s

Chapter: Conclusion

What We Covered

02m 29s

What Comes Next

02m 28s

Wrap-Up

00m 32s