Learning Linux Security

Video description

In this Learning Linux Security training course, expert author Ric Messier will teach you how to secure a Linux system. This course is designed for the absolute beginner, meaning no Linux Security experience is required.

You will start by learning about booting, then jump into covering service management. From there, Ric will teach you about logging and log management, intrusion detection and preventions, and users and permissions. This video tutorial also covers utilities and the Linux Kernel, including Kernel modules, builds, and managing Kernel parameters. Finally, you will learn about firewalls, such as iptables, targets, rate limiting, and zones and services.

Completing this computer based training course will kickstart your understanding of Linux security.

Publisher resources

View/Submit Errata

Table of contents

  1. Introduction
    1. Introduction
    2. What Will Be Covered
    3. What Is Linux
    4. Distributions
    5. Scratch Versus Binary
    6. Ubuntu Package Management
    7. RedHat Package Management
  2. Booting
    1. The Boot Process
    2. Physical Protections
    3. The Boot Manager - GRUB
    4. Protecting The Boot Manager
    5. xinetd
    6. Runlevels
    7. Setting Default Runlevels
    8. GRUB2
    9. LILO
  3. Services
    1. Service Management
    2. Service Management With RHEL7
    3. TCP Wrappers
    4. Listening Ports
    5. Standard Postfix Configuration
    6. Apache Configuration
    7. Hardening Apache
    8. Virtual Hosts In Apache
    9. DNSSec
    10. MySQL
    11. PostgreSQL
    12. Tomcat
    13. JBoss
    14. mod_security
    15. SSL-TLS And Apache
    16. SPF And Greylisting In Postfix
  4. Logging And Log Management
    1. Syslog
    2. Remote Logging
    3. Reading Log Files
    4. Logwatch
    5. Log Aggregation
    6. utmp And wtmp
  5. Intrusion Detection And Prevention
    1. Anti-Virus
    2. Tripwire
    3. Samhaim
    4. Prelude
    5. AIDE
    6. Snort
    7. Alerting With Snort
    8. Snort Console
    9. Reading Snort Traces With Wireshark
    10. RootKitHunter
  6. Users And Permissions
    1. etc-shadow And etc-passwd Files
    2. Creating Users
    3. Securing Passwords
    4. Cracking Passwords
    5. Alternate User Management
    6. AppArmor
    7. Unix Permissions
    8. SELinux
    9. Modifying SELinux Permissions
    10. Restoring SELinux Permissions
    11. PAM
  7. Utilities
    1. netstat
    2. Process Management – top And ps
    3. Process Management – kill
    4. nmap
    5. OpenVAS
    6. Nexpose
    7. Find
    8. tcpdump
    9. Wireshark
    10. lspci And lsusb
  8. Kernel
    1. Linux Kernel
    2. Kernel Modules
    3. Managing Kernel Parameters
    4. Kernel Builds
    5. Kernel Config
    6. Viewing Kernel Config From Running Kernel
  9. Firewalls
    1. iptables
    2. NAT With iptables
    3. iptables Tables
    4. Matching On Protocol
    5. Rate limiting
    6. New Versus Established Versus Related
    7. Targets
    8. iptables Logs
    9. iptables With Multiple Interfaces
    10. Firewalld
    11. Zones And Services
    12. Matching On Owner
    13. ufw
    14. gufw
  10. Conclusion
    1. What We Covered
    2. What Comes Next
    3. Wrap-Up

Product information

  • Title: Learning Linux Security
  • Author(s):
  • Release date: June 2015
  • Publisher(s): Infinite Skills
  • ISBN: 9781771374194