Linux Security Techniques 2023 - Printable Version +- Softwarez.Info - Software's World! (https://softwarez.info) +-- Forum: Library Zone (https://softwarez.info/Forum-Library-Zone) +--- Forum: Video Tutorials (https://softwarez.info/Forum-Video-Tutorials) +--- Thread: Linux Security Techniques 2023 (/Thread-Linux-Security-Techniques-2023) |
Linux Security Techniques 2023 - AD-TEAM - 01-24-2025 Linux Security Techniques Published 9/2023 MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz Language: English | Size: 9.66 GB | Duration: 10h 46m Security features for modern Linux distributions [b]What you'll learn[/b] Identify security incidents, track system activities, and ensure compliance with security policies Maintain the integrity and confidentiality of your Linux systems and ensures compliance with security policies and regulations. Develop and enforce data security policies tailored to your organization's specific needs and regulatory requirements. Learn to configuring SELinux, verify status of SELinux, modify status temporarily, view SELinux Learn all about TCP Wrappers, enable TCP Wrappers for a service, allowing access to more than one service at a time, option fields, generating log messages, SPA Get the skills and knowledge to effectively assess and improve the security of computer systems, networks, and applications [b]Requirements[/b] Proficiency in Linux command-line operations. Basic understanding of Linux system administration. [b]Description[/b] The Linux Security Techniques series introduces the viewers to the various security features found in modern Linux distributions. Topics covered include data encryption, auditing access, SELinux and firewall configuration among others. The series also lightly covers penetration testing to ensure that each security technique is implemented properly.Linux Security Techniques is an advanced-level course designed to equip students with the knowledge and skills necessary to secure Linux-based systems effectively. In today's digital landscape, securing Linux servers and workstations is of utmost importance, as these systems power a wide range of critical infrastructure and applications. This course delves deep into various security aspects of Linux, providing students with practical insights and hands-on experience in safeguarding their systems against a wide range of threats.This Linux Security Techniques course will empower students with the knowledge and skills needed to mitigate security risks, protect critical assets, and maintain the integrity of Linux-based systems in a constantly evolving cybersecurity landscape.· Identify security incidents, track system activities, and ensure compliance with security policies· Maintain the integrity and confidentiality of your Linux systems and ensures compliance with security policies and regulations.· Develop and enforce data security policies tailored to your organization's specific needs and regulatory requirements.· Learn to configuring SELinux, verify status of SELinux, modify status temporarily, view SELinux· Learn all about TCP Wrappers, enable TCP Wrappers for a service, allowing access to more than one service at a time, option fields, generating log messages, SPAWN, EXPANSIONS, TWIST, configuring rules, and restricting access to SSH.· Get the skills and knowledge to effectively assess and improve the security of computer systems, networks, and applications Overview Section 1: Monitoring and Auditing Security Lecture 1 Overview Lecture 2 Managing Logs with syslog Lecture 3 Managing Logs with journald Lecture 4 Auditing User Passwords Lecture 5 Auditing User Passwords Part 2 Lecture 6 Auditing the Filesystem Lecture 7 Auditing SUID and SGID Lecture 8 Auditing Logins with fail2ban Section 2: Data Security Lecture 9 LUKS Disk Encryption Lecture 10 Data Encryption with GPG Lecture 11 MD5 and SHA Checksums Lecture 12 Data Encryption with SSH Section 3: Securing Services Lecture 13 Securing Services with SELinux Lecture 14 Securing Services with SELinux Part 2 Lecture 15 Chroot Jails Lecture 16 LXC Containers Section 4: Securing Networks Lecture 17 TCP Wrappers Lecture 18 Network Security with iptables Lecture 19 Network Security with firewalld Section 5: Security Testing Lecture 20 Verifying Firewall Configurations Lecture 21 Verifying Network Data Encryption Lecture 22 Verifying Network Data Encryption Part 2 Linux system administrators,DevOps engineers,Security professionals,IT professionals responsible for Linux-based systems RapidGator AlfaFile TurboBit |