HAPPY BOOKSGIVING
Use code BOOKSGIVING during checkout to save 40%-55% on books and eBooks. Shop now.
Register your product to gain access to bonus material or receive a coupon.
Video accessible from your Account page after purchase.
Linux Security Complete Video Course
More than 13 hours of video instruction.
Overview
Learn everything you need to know about Linux security in one title.
Description
Linux Security Complete Video Course teaches you everything you need to know to build a safe Linux environment. Taught by best-selling author and trainer Sander van Vugt, Linux Security Complete Video Course covers every aspect of Linux security, including Linux operating system security, managing Linux user security, securing Linux services, and securing Linux infrastructure.
The topics in this course cover all the exam objectives and prepare you for the two most significant certifications in the field of Linux security: the Red Hat RHCA Server Hardening (EX413) exam and the LPIC-3 exam 303 "Linux Security" exam. Even if you're preparing for just one of the exams, it’s recommend that you watch all the lessons in this course, which lays out a framework for understanding Linux security, mitigating threats, and responding to incidents.
The material provided in this course is designed to help you learn and prepare in the best possible way. Each lesson provides an end-of-lesson lab that walks you through real-world scenarios as you learn. They also act as assignments to help you prepare for the scenarios you will encounter on the Red Hat Server Hardening exam. These labs are provided as text as well as video solutions so you can work through them on your own and then compare your work to the author’s.
In addition to the end-of-lesson labs, this course provides you with quizzes to help you learn content and prepare for the LPI Exam 303 test. You will also find interactive CLI sim exercises and drag-and-drop content exercises to help you retain knowledge.
The video lessons cover the following topics:
Module 1: Linux Operating System Security
Lesson 1: Keeping Linux up-to-date
Lesson 2: Managing file system security properties
Lesson 3: Securing server access
Lesson 4: Configuring system logging
Lesson 5: Managing system auditing
Lesson 6: Managing mandatory access control (MAC)
Lesson 7: Managing kernel security
Module 2: Managing Linux User Security
Lesson 8: Managing Linux permissions and attributes
Lesson 9: Managing user accounts
Lesson 10: Installing central authentication
Module 3: Securing Linux Services
Lesson 11: Securing services
Lesson 12: Securing network file systems
Lesson 13: Applying secure remote access solutions
Module 4: Securing Linux Infrastructure
Lesson 14: Sniffing and port scanning
Lesson 15: Configuring analyzing and intrusion detection tools
Lesson 16: Managing firewalls
Lesson 17: Managing certificates and public key infrastructures
Lesson 18: Managing GPG
Skill Level
* Intermediate
What You Will Learn
* Linux security
* Red Hat RHCA Server Hardening exam
* LPIC-3 Security exam
Who Should Take This Course
This course works best for an audience that already has acquired some experience working with Linux. If you are a beginner or you need some a refresher course, you can start with the "Beginning Linux System Administration" course, the Red Hat Certified Systems Administrator (RHCSA) Complete Video Course, or the CompTIA Linux+ / LPIC-1 Complete Video Course.
About LiveLessons Video Training
LiveLessons Video Training series publishes hundreds of hands-on, expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. This professional and personal technology video series features world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, IBM Press, Pearson IT Certification, Prentice Hall, Sams, and Que. Topics include IT Certification, Programming, Web Development, Mobile Development, Home and Office Technologies, Business and Management, and more.
View all LiveLessons on InformIT at http://www.informit.com/livelessons
Pearson IT Certification, and Sander Van Vugt have no affiliation with Red Hat, Inc. The RED HAT and RHCSA trademarks are used for identification purposes only and are not intended to indicate affiliation with or approval by Red Hat, Inc.
Module 1: Linux Operating System Security
Lesson 1: Keeping Linux up-to-date
1.1 Developing an update strategy
1.2 Applying security updates on Red Hat
1.3 Applying security updates on Ubuntu
1.4 Validating packages
Lesson 1 Lab
Lesson 1 Solution
Lesson 2: Managing file system security properties
2.1 Creating encrypted volumes - Part 1
2.2 Creating encrypted volumes - Part 2
2.3 Using security related mount options
2.4 Monitoring file system changes (AIDE)
Lesson 2 Lab
Lesson 2 Solution
Lesson 3: Securing server access
3.1 Securing the GRUB boot loader
3.2 Modifying text console settings
3.3 Modifying graphical console settings
Lesson 3 Lab
Lesson 3 Solution
Lesson 4: Configuring system logging
4.1 Understanding Linux logging
4.2 Configuring secure remote logging: Creating the CA
4.3 Configuring secure remote logging: Configuring the key material
4.4 Configuring secure remote logging: Setting up the log server
4.5 Configuring secure remote logging: Setting up log filtering
4.6 Managing log rotation
4.7 Making journald logs persistent
4.8 Using Logwatch for log analysis
Lesson 4 Lab
Lesson 4 Solution
Lesson 5: Managing system auditing
5.1 Reading the audit log
5.2 Configuring auditing
5.3 Audit reporting
5.4 Writing custom audit rules
5.5 Using predefined audit sets
Lesson 5 Lab
Lesson 5 Solution
Lesson 6: Managing mandatory access control (MAC)
6.1 Understanding the need for MAC
6.2 Comparing SELinux to AppArmor
6.3 Configuring AppArmor
6.4 Understanding SELinux workings
6.5 Configuring SELinux file context
6.6 Configuring SELinux port context
6.7 Analyzing SELinux events
6.8 Writing custom SELinux modules
6.9 Managing users in SELinux
6.10 Other MAC solutions (Smack)
Lesson 6 Lab
Lesson 6 Solution
Lesson 7: Managing kernel security
7.1 Understanding kernel security architecture
7.2 Linux kernel security issues
7.3 Fixing Linux kernel vulnerabilities
Lesson 7 Lab
Lesson 7 Solution
Module 2: Managing Linux User Security
Lesson 8: Managing Linux permissions and attributes
8.1 Summarizing basic permission usage
8.2 Managing special permissions
8.3 Finding files with special permissions
8.4 Managing default permissions
8.5 Managing access control lists
8.6 Using extended attributes
Lesson 8 Lab
Lesson 8 Solution
Lesson 9: Managing user accounts
9.1 Managing password properties
9.2 Auditing user accounts
9.3 Understanding PAM Part 1
9.4 Understanding PAM Part 2
9.5 Understanding security related PAM options
9.6 Configuring PAM
9.7 Applying account lockout with PAM Tally
9.8 Configuring sudo
Lesson 9 Lab
Lesson 9 Lab Solution
Lesson 10: Installing central authentication
10.1 Understanding LDAP
10.2 Understanding Kerberos
10.3 Installing FreeIPA server
10.4 Installing FreeIPA clients
10.5 Understanding the role of sssd
10.6 Managing users and groups on FreeIPA
10.7 Setting policies on FreeIPA
10.8 Configuring centralized sudo rules
Lesson 10 Lab
Lesson 10 Lab Solution
Module 3: Securing Linux Services
Lesson 11: Securing services
11.1 Understanding DNS security issues
11.2 Securing DNS
11.3 Securing Apache
11.4 Securing e-mail
11.5 Securing SSH
11.6 Securing vsftpd
Lesson 11 Lab
Lesson 11 Solution
Lesson 12: Securing network file systems
12.1 Understanding NFSv4 security improvements
12.2 Configuring NFSv4 server and clients
12.3 Understanding NFSv4 authentication mechanisms
12.4 Using NFSv4 pseudo file systems
12.5 Understanding NFSv4 ACLS
12.6 Understanding and using CIFS UNIX extensions
12.7 Understanding and configuring CIFS security modes (NTLM, Kerberos)
12.8 Managing, mapping and handling of CIFS, ACLs and SIDs
Lesson 12 Lab
Lesson 12 Solution
Lesson 13: Applying secure remote access solutions
13.1 Configuring FreeRADIUS to authenticate network nodes
13.2 Identifying and dealing with rogue router advertisements and DHCP
13.3 Configuring and operating OpenVPN server and clients
13.4 Configuring and operating IPsec server and clients
Lesson 13 Lab
Lesson 13 Solution
Module 4: Securing Linux Infrastructure
Lesson 14: Sniffing and port scanning
14.1 Understanding network sniffing
14.2 Using tcpdump and Wireshark for package capture
14.3 Introducing nmap
14.4 Understanding Nessus
14.5 Using tripwire
Lesson 14 Lab
Lesson 14 Solution
Lesson 15: Configuring analyzing and intrusion detection tools
15.1 Introducing Snort
15.2 Performing a base Snort configuration
15.3 Understanding Snort output
15.4 Introducing Nagios
15.5 Using ntop
15.6 Using John the Ripper
15.7 Introducing Puppet
Lesson 15 Lab
Lesson 15 Solution
Lesson 16: Managing firewalls
16.1 Understanding IPtables basics
16.2 Advanced IPtables usage
16.3 Working with firewalld
16.4 Working with firewalls
Lesson 16 Lab
Lesson 16 Solution
Lesson 17: Managing certificates and public key infrastructures
17.1 Understand x.509 certificates and their properties
17.2 Understanding trust chains and public key infrastructures
17.3 Generating and managing public and private keys
17.4 Creating, operating, and securing a certification authority
17.5 Request, sign, and manage server and client certificates
17.6 Revoke certificates and certification authorities
17.7 Using openssl for SSL/TLS client and server tests
17.8 Using the openssl command for testing TLS certificates
Lesson 17 Lab
Lesson 17 Solution
Lesson 18: Managing GPG
18.1 Performing Basic GnuPG configuration, usage, and key revocation
18.2 Using GnuPG in e-mail
18.3 Using GnuPG to encrypt files
Lesson 18 Lab
Lesson 18 Solution