Linux Hardening and Security, Part 2 of 3: Network and Account
Interactive

Linux Hardening and Security, Part 2 of 3: Network and Account

LearnNow Online
Updated Jul 20, 2020

Course description

The Linux Security course explores the various tools and techniques commonly used by Linux system administrators and end users to complete their day-to-day tasks in a Linux environment. It is designed for experienced computer users who have limited previous exposure to Linux, whether they are working in an individual or a corporate environment. This course covers Security by Account types, SSH, Firewalls and TCP Wrappers

Each LearnNowOnline training course is made up of Modules (typically an hour in length). Within each module there are Topics (typically 15-30 minutes each) and Subtopics (typically 2-5 minutes each). There is a Post Exam for each Module that must be passed with a score of 70% or higher to successfully and fully complete the course.


Prerequisites

A basic understanding of the Linux operating system.


Meet the expert

Jason Cannon

Jason Cannon is the author of Linux Administration, the founder of the Linux Training Academy, and an instructor to thousands of satisfied students. He has worked for many technology companies who take information security seriously as well as security firms such as Mandiant and FireEye.

Video Runtime

109 Minutes

Time to complete

184 Minutes

Course Outline

Network and Account

PAM (23:29)

  • Introduction (00:13)
  • Account security intro (00:45)
  • Intro to pam (05:13)
  • Pam configuration example (04:04)
  • Password security (07:58)
  • Controlling account access (05:06)
  • Summary (00:08)

Security by Account Type (16:56)

  • Introduction (00:08)
  • Security by Account Type (06:01)
  • Demo: Security (03:11)
  • Demo: Linux Account Types (07:27)
  • Summary (00:08)

Network Security (15:06)

  • Introduction (00:08)
  • Network Security Overview (00:35)
  • Securing Network Services (07:54)
  • Port Security (06:20)
  • Summary (00:08)

SSH (15:45)

  • Introduction (00:08)
  • Securing SSH (07:30)
  • Linux Firewall (07:58)
  • Summary (00:08)

Firewalls (12:18)

  • Introduction (00:08)
  • Securing SSH (03:13)
  • IPTables (03:56)
  • Rule Specifications (04:52)
  • Summary (00:08)

Firewalls Cont. (14:03)

  • Introduction (00:08)
  • Rules Specification Examples (03:59)
  • Demo: Network Security Firewalls (09:47)
  • Summary (00:08)

TCP Wrappers (11:21)

  • Introduction (00:08)
  • TCP Wrappers (07:05)
  • TCP Wrapper Examples (03:59)
  • Summary (00:08)
;